Mind Matters News and Analysis on Natural and Artificial Intelligence

CategoryData Privacy

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.

Can Your Tablet Really Tell People Where You Are?

Yes, and it'll talk louder with the next gen protocols. But there's a way to shut it up

If someone can see your traffic as it is transmitted across the “first hop” physical network and your devices are using the manufacturer-assigned MAC address, they can discover the unique address assigned to your device.

Read More ›
Man trying to whistle

Google’s Secret Health Data Grab: The Whistleblower Talks

This is the fourth whistleblower in the last eighteen months

“The decision came to me slowly, creeping on me through my day-to-day work,” we are told, until it came down to “how could I say nothing?”

Read More ›
3D Rendering of abstract binary data in glowing blue and red color. For deep machine learning, crypto currency, hi tech product uses. Big data visualization, artificial intelligence. With copy space

The Greatest Threat We Face From AI—and What We Can Do

Here’s a list of things that have really happened with artificial intelligence (AI), in order of increasing severity.

When we get to the end of the list, we will see that it is like beads connected by a string—revealing the most dangerous threat.

Read More ›
Medical Research Scientist Typing Information Obtained from New Experimental Drug Trial. She Works in a Bright and Modern Laboratory.

The Nightingale Sings — About Your Health Data

The skinny from Google’s health care data grab: Your privacy may not be anywhere near as well protected as you might think

The biggest question coming into focus is whether traditional patient confidentiality protection really works in the age of the internet. As to what changes are needed and who will sponsor them, both US Sen. Amy Klobuchar and US Sen. Josh Hawley, on opposite sides of the aisle, are watching the file.

Read More ›
COSM-3296

Your smartphone will disappear, says AT&T CTO

New 5G computing will introduce an era of ever smarter wearable devices, according to Andre Fuetsch

Fuetsch asks us to think of 3G (2001) and 4G (2010) internet as the difference between a junior high school rock band and a high school rock band: “The high school band is a lot louder and a lot faster.” And 5G? “It is a 40-piece orchestra. A wide spectrum of abilities but tight structure and control.”

Read More ›
COSM-3188

Chair of Forbes Media Says Money Is About Trust

Experts forecast the future of money in general at COSM

Facebook wants to start minting its own money. Amazon is said to be thinking about it. Bitcoin has many enthusiasts. But what determines the value of money in a digital age?

Read More ›
Telecommunication network above city, wireless mobile internet technology for smart grid or 5G LTE data connection, concept about IoT, global business, fintech, blockchain

Smart Cities?: Proceed With Caution!

Zaheer Allam provides a balanced view of the future impact of AI on society

In some Smart City master plans, our privacy will be seriously compromised.

Read More ›
Cuboid with Digital Zeros and Ones

How Much Google Do You Really Need?

As more people are becoming concerned about Big Tech’s snooping and apparent political ambitions, practical responses are emerging

Getting away from constant surveillance and dangerous little bubbles of manipulated information is easier than some users may realize, tech pioneers and experts say. You can make simple changes today.

Read More ›
https

Your Browser CAN Be Secure

If you are willing to think beyond Google

The place to begin, however, is with a simple rule of thumb: if a system is convenient, you are probably trading your information for that convenience. If you want to reduce your “digital exhaust,” you will need to do things that are a little less convenient.

Read More ›
ev-623589-unsplash

Cash For Your Data Won’t Solve Big Tech Privacy Issues

It seems like such a great idea… at first. But how do you know what the data is really worth?

Privacy is a fundamental right tied to the person, rather than something on which a price tag can be placed, which can be sold for a fistful of dollars.

Read More ›
The Dreamy Abstract background from soap bubble in the air with nature defocused

Escaping the News Filter Bubble: Three Simple Tips

Spoiler: Reduce the amount of information big providers have about YOU

Over time, unnoticed bubbles form ever more effective barriers against alternative information, maybe information you need. But getting out requires only a few simple steps.

Read More ›
katie-treadway-2OOiqCrrGbQ-unsplash
Friends talking to each

Facebook Gets Rich Off What We Tell Our Friends

Social media pioneer David Gelernter also has a proposal for sharing the wealth more fairly

Yale University computer science prof David Gelernter, “a leading figure in the third generation of artificial intelligence” (Edge.org). social networks pioneer, and Unabomber survivor, discusses his idea in a podcast at The Federalist Radio Hour.

Read More ›
Photo by Brett Jordan
Book with fold-out, pop-up

Pop-Ups? Just Say “No” — and Close Those Tabs

Making the internet work for YOU means, among other things, getting control of who can follow you around

If allowing these notifications sounds like a perfect avenue for an attacker, that’s because it is. This attack surface is a very large hole in the security of your computer.

Read More ›
Brain icon hologram with office interior on background. Double exposure. Concept of education

How Far Has AI Mindreading Come?

Further than we may think. And some trends are troubling
It’s becoming easier all the time to read signals from the human brain. But there are few or no safeguards, even in the free world, on who has a right to use the information and how. Read More ›
3d rendering head voice recognition system of blue ground

China: What You Didn’t Say Could Be Used Against You

An AI voiceprint could be used to generate words never said
Given the Chinese government’s loose interpretation of “counterterrorism” actions, there is a concern that such voice cloning could be used to incriminate religious minorities or those who do not show appropriate loyalty to the governing CCP. Read More ›
girls and boys on bench playing games in yard
Boys and girls playing Chinese whispers, whispering game or message relay

Should You Pay For a Virtual Private Network (VPN)?

Here's what a VPN can and can't do for you

In some cases, specifically when you are using public wireless services, using a VPN can add measurably to your privacy and security. But VPNs are not a “silver bullet” in solving the many security and privacy issues users face today.

Read More ›
Superior Artificial Intelligence Wining Chess Concept

Confirmed: DeepMind’s Deepest Mind Is on Leave

The chess champ computer system just never made money
Co-founder Mustafa Suleyman is a philosopher and social justice activist who hoped to use the technology for fundamental transformations. But his AI ethics board lasted about seven days at Google. Read More ›
Man with cardboard box on his head on grey background

The Machine Knows You Are Angry

Okay, it knows if your facial muscles are twisted in a certain way… does the difference matter?
Five accomplished scientists representing different camps reviewed over a thousand studies of machine emotion recognition. Essentially, there seems no clear science basis for the claims made. Read More ›
Leuchtende Würfel mit Paragraphen-Symbol auf Tastatur

The Internet’s Structure Builds In Privacy Flaws

The Domain Name resolver knows every service you visit, and every service those services rely on, as you move around the internet

How can you create a directory that anyone can access and yet keep what everyone is asking for private? Short of moving to a paper-based DNS system (think, a stack of New York City-size telephone directories), there isn’t a good answer within the present system.

Read More ›