I’ve previously written about ad networks using ultrasonic communications to jump from one device to another. The idea is for devices like televisions to play ultrasonic codes in advertisements and for nearby smartphones to detect them. This way the two devices can be linked. Creepy, yes. And also increasingly common, as this research demonstrates: Privacy … Read More “Using Ultrasonic Beacons to Track Users” »
Month: May 2017
In the oval squid Sepioteuthis lessoniana, males use body patterns to communicate with both females and other males: To gain insight into the visual communication associated with each behavior in terms of the body patterning’s key components, the co-expression frequencies of two or more components at any moment in time were calculated in order to … Read More “Friday Squid Blogging: Squid Communications” »
I’ve been reading a bunch of anecdotal reports that the TSA is starting to scan paper separately: A passenger going through security at Kansas City International Airport (MCI) recently was asked by security officers to remove all paper products from his bag. Everything from books to Post-It Notes, documents and more. Once the paper products … Read More “Why Is the TSA Scanning Paper?” »
LyreBird is a system that can accurately reproduce the voice of someone, given a large amount of sample inputs. It’s pretty good — listen to the demo here — and will only get better over time. The applications for recorded-voice forgeries are obvious, but I think the larger security risk will be real-time forgery. Imagine … Read More “Forging Voice” »
This is a good summary article about the horrible security of St. Jude pacemakers, and the history of the company not doing anything about it. Powered by WPeMatico
Fitbit evidence is cited in an arrest warrant, stating that the device monitored steps by the victim after the suspect claimed she died. Powered by WPeMatico
There’s something going on inside the intelligence communities in at least two countries, and we have no idea what it is. Consider these three data points. One: someone, probably a country’s intelligence organization, is dumping massive amounts of cyberattack tools belonging to the NSA onto the Internet. Two: someone else, or maybe the same someone, … Read More “Who is Publishing NSA and CIA Secrets, and Why?” »