БЛОГ

Archive for the ‘privacy’ category: Page 5

Mar 3, 2023

Galea: The Bridge Between Mixed Reality and Neurotechnology

Posted by in categories: augmented reality, neuroscience, privacy

Conor russomanno, founder and CEO of openbci eva esteban, embedded software engineer at openbci

Galea is an award-winning platform that merges next-generation biometrics with mixed reality. It is the first device to integrate a wide range of physiological signals, including EEG, EMG, EDA, PPG, and eye-tracking, into a single headset. In this session, Conor and Eva will provide a live demonstration of the device and its capabilities, showcasing its potential for a variety of applications, from gaming to training and rehabilitation. They will give an overview of the different hardware and software components of the system, highlighting how it can be used to analyze user experiences in real time. Attendees will get an opportunity to ask questions at the end.

Feb 15, 2023

Generative AI Unlocking Floodgates to Solve Data Scarcity

Posted by in categories: privacy, robotics/AI, transportation

The concept of synthetic data is almost too good to be true – it can mimic the distinctive properties of a dataset while dodging a number of issues that afflict data. There are zero data privacy concerns around synthetic data since it is artificially generated and isn’t related to real-world persons. It can be manufactured on demand and in the volumes required. In other words, synthetic data is a boon in a world eternally thirsty for data.

And the hectic space of generative AI is offering a helping hand in the easy generation of synthetic data.

The concept of synthetic data has been around for decades until the autonomous vehicle (AV) industry started using it commercially in the mid-2010s. But for how important an issue it resolves, creating synthetic data brings a myriad of complications along with it.

Jan 27, 2023

Chrome for Android now lets you lock your incognito session

Posted by in categories: privacy, robotics/AI, security

Chrome is rolling out an update for Android users that lets them lock their incognito sessions with a password code or biometric info when they exit the app. The feature has been available for iOS users for some time, but now it’s being made available to folks using Chrome on Android.

Users can activate this feature by going to Chrome Settings Privacy & Security and turning on the “Lock incognito tabs when you close Chrome” toggle. So next time when a user exits Chrome, their incognito session will automatically be locked. To unlock the incognito tabs, you can use the biometric unlock on the phone such as a fingerprint unlock or lock code.

Jan 10, 2023

AI Trains Fire Fighters — A Man’s Best Friend

Posted by in categories: augmented reality, privacy, robotics/AI, transportation

This post is also available in: he עברית (Hebrew)

Fire departments conducting “size up” training typically rely on whiteboard discussions, drives around neighborhoods and photo-based systems. New training technology will help firefighters train for different types of fires or hazardous material situations, vehicle accidents, residential and commercial buildings, etc. An augmented reality training tool for firefighters, called Forge, uses artificial intelligence and biometric training to simulate real emergencies. Developed by Avrio Analytics, the system is designed to make sure that firefighters possess communication, situational awareness and associated skills needed in emergencies.

“Biometric and performance data collected during training allows Forge’s AI to dynamically change the training based on the user’s cognitive load, such as providing more or less guidance to the individual or introducing new training complexity in real-time,” the company told govtech.com. “This allows for training sessions tailored to the ability of the individual.”

Dec 28, 2022

Military device with biometric database of 2K people sold on eBay for $68

Posted by in categories: government, military, privacy, terrorism

When a German security researcher, Matthias Marx, found a United States military device for sale on eBay—an instrument previously used to identify wanted individuals and known terrorists during the War in Afghanistan—Marx gambled a little and placed a low bid of $68.

He probably didn’t expect to win, since he offered less than half the seller’s asking price, $149.95. But win he did, and after that, he had an even bigger surprise coming, The New York Times reported. When the device arrived with a memory card still inside, Marx was shocked to realize he had unwittingly purchased the names, nationalities, photographs, fingerprints, and iris scans of 2,632 people whose biometric data had allegedly been scanned by US military.

The device allegedly stored not just personal identifiable information (PII) of seemingly suspicious persons, but also of US military members, people in Afghanistan who worked with the government, and ordinary people temporarily detained at military checkpoints. Most of the data came from residents of Afghanistan and Iraq.

Dec 19, 2022

A face recognition framework based on vision transformers

Posted by in categories: law enforcement, privacy, robotics/AI, security, surveillance

Face recognition tools are computational models that can identify specific people in images, as well as CCTV or video footage. These tools are already being used in a wide range of real-world settings, for instance aiding law enforcement and border control agents in their criminal investigations and surveillance efforts, and for authentication and biometric applications. While most existing models perform remarkably well, there may still be much room for improvement.

Researchers at Queen Mary University of London have recently created a new and promising for face recognition. This architecture, presented in a paper pre-published on arXiv, is based on a strategy to extract from images that differs from most of those proposed so far.

“Holistic methods using (CNNs) and margin-based losses have dominated research on face recognition,” Zhonglin Sun and Georgios Tzimiropoulos, the two researchers who carried out the study, told TechXplore.

Dec 19, 2022

Why our digital future hinges on identity and rebuilding trust

Posted by in categories: government, privacy, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

The adoption of a password-free future is hyped by some of the biggest tech companies, with Apple, Google, and Microsoft committing to support the FIDO standard this past May. Along with the Digital ID Bill reintroduced to Congress this past July, we’re poised to take a giant leap away from the password to a seemingly more secure digital future. But as we approach a post-password world, we still have a long way to go in ensuring the security of our digital lives.

As companies continue developing solutions to bridge us to a passwordless world, many have prioritized convenience over security. Methods of two-factor authentication (2FA) and multi-factor authentication (MFA) such as SMS or email verification — or even the use of biometrics — have emerged as leading alternatives to the traditional username/password. But here’s the catch: Most of these companies are validating devices alone and aren’t properly leveraging this technology, leaving the door open for bad actors.

Dec 17, 2022

An AI-based platform to enhance and personalize e-learning

Posted by in categories: privacy, robotics/AI

Researchers at Universidad Autónoma de Madrid have recently created an innovative, AI-powered platform that could enhance remote learning, allowing educators to securely monitor students and verify that they are attending compulsory online classes or exams.

An initial prototype of this platform, called Demo-edBB, is set to be presented at the AAAI-23 Conference on Artificial Intelligence in February 2022, in Washington, and a version of the paper is available on the arXiv preprint server.

“Our investigation group, the BiDA-Lab at Universidad Autónoma de Madrid, has substantial experience with biometric signals and systems, behavior analysis and AI applications, with over 300 hundred published papers in last two decades,” Roberto Daza Garcia, one of the researchers who carried out the study, told TechXplore.

Dec 5, 2022

Scientists create AI neural net that can unlock digital fingerprint-secured devices

Posted by in categories: information science, mobile phones, privacy, robotics/AI, security

Computer scientists at New York University and Michigan State University have trained an artificial neural network to create fake digital fingerprints that can bypass locks on cell phones. The fakes are called “DeepMasterPrints”, and they present a significant security flaw for any device relying on this type of biometric data authentication. After exploiting the weaknesses inherent in the ergonomic needs of cellular devices, DeepMasterPrints were able to imitate over 70% of the fingerprints in a testing database.

An artificial neural network is a type of artificial intelligence comprising computer algorithms modeled after the human brain’s ability to recognize patterns. The DeepMasterPrints system was trained to analyze sets of fingerprint images and generate a new image based on the features that occurred most frequently. This “skeleton key” could then be used to exploit the way cell phones authenticate user fingerprints.

In cell phones, the necessarily small size of fingerprint readers creates a weakness in the way they verify a print. In general, phone sensors only capture a partial image of a print when a user is attempting to unlock the device, and that piece is then compared to the phone’s authorized print image database. Since a partial print means there are fewer characteristics to distinguish it than a full print, a DeepMasterPrint needs to match fewer features to imitate a fingerprint. It’s worth noting that the concept of exploiting this flaw is not unique to this particular study; however, generating unique images rather than using actual or synthesized images is a new development.

Nov 29, 2022

Whole Foods shoppers can now pay with palm scans

Posted by in categories: food, mobile phones, privacy

Amazon is bringing its palm print-scanning biometric payment technology to several Whole Foods locations.

Biometrics: Every person has measurable physical characteristics that are unique to them — and because these attributes are unique and measurable, they can be used to verify our identity.

Biometric technologies — like the one that probably unlocks your phone — automate this verification, analyzing a face, fingerprint, or palm for distinct identifiers linked to a specific person.

Page 5 of 31First23456789Last