Toggle light / dark theme

Apple just released new information about how facial recognition on the iPhone X works

Apple updated the security and privacy information on its website on Wednesday, revealing new details about how its new facial-recognition technology works.

The new details come about a month before Apple’s most advanced iPhone, the iPhone X, goes on sale. The banner feature of the iPhone X is a facial-recognition tool called Face ID that unlocks the phone, replacing the fingerprint sensor.

Since Face ID and its corresponding 3D camera, called TrueDepth, were announced earlier this month, the technology has attracted a lot of attention and speculation from privacy advocates and security experts. Sen. Al Franken even wrote an open letter to Apple CEO Tim Cook with 10 questions about the technology.

Facing poverty, academics turn to sex work and sleeping in cars

Adjuncting has grown as funding for public universities has fallen by more than a quarter between 1990 and 2009. Private institutions also recognize the allure of part-time professors: generally they are cheaper than full-time staff, don’t receive benefits or support for their personal research, and their hours can be carefully limited so they do not teach enough to qualify for health insurance.


Adjunct professors in America face low pay and long hours without the security of full-time faculty. Some, on the brink of homelessness, take desperate measures.

Malicious code written into DNA infects the computer that reads it

In a mind-boggling world first, a team of biologists and security researchers have successfully infected a computer with a malicious program coded into a strand of DNA.

It sounds like science fiction, but I assure you it’s quite real — although you probably don’t have to worry about this particular threat vector any time soon. That said, the possibilities suggested by this project are equally fascinating and terrifying to contemplate.

The multidisciplinary team at the University of Washington isn’t out to make outlandish headlines, although it’s certainly done that. They were concerned that the security infrastructure around DNA transcription and analysis was inadequate, having found elementary vulnerabilities in open-source software used in labs around the world. Given the nature of the data usually being handled, this could be a serious problem going forward.

VIDEO: San Francisco official pushes robot tax to battle automation

SAN FRANCISCO (AP) — Security guard Eric Leon watches the Knightscope K5 security robot as it glides through the mall, charming shoppers with its blinking blue and white lights. The brawny automaton records video and sounds alerts. According to its maker, it deters mischief just by making the rounds.

Leon, the all-too-human guard, feels pretty sure that the robot will someday take his job.

“He doesn’t complain,” Leon says. “He’s quiet. No lunch break. He’s starting exactly at 10.”

Chip implants make humans more efficient

My new Op-Ed for The San Francisco Chronicle: http://www.sfchronicle.com/opinion/openforum/article/Chip-im…003194.php #transhumanism


Wisconsin company Three Square Market recently announced it will become the first U.S. company to offer its employees chip implants that can be scanned at security entrances, carry medical information and even purchase candy in some vending machines. A company in Europe already did this last year.

For many people, it sounds crazy to electively have a piece of technology embedded in their body simply for convenience’s sake. But a growing number of Americans are doing it, including me.

I got my RFID implant two years ago, and now I use it to send text messages, bypass security codes on my computer, and open my front door. Soon I’ll get the software to start my car, and then my life will be totally keyless.

The type of chip implants in humans varies depending on the manufacturer or purpose of the device. A few hundred thousand people around the world have cochlear implants, which allow deaf people to hear. Others have implants to help with Alzheimer’s, Parkinson’s or even depression. A growing number of transhumanists — people who want to use radical technology in their bodies — have the $60 implant I have. It’s tiny, about the size of a grain of rice, and is injected into the body by a syringe. The injection process — usually in the hand near the thumb — is often bloodless and takes seconds to complete.

The Great US-China Biotechnology and Artificial Intelligence Race

The risk factor is that iCarbonX is handling more than personal data, but potentially vulnerable data as the company uses a smartphone application, Meum, for customers to consult for health advice. Remember that the Chinese nascent genomics and AI industry relies on cloud computing for genomics data-storage and exchange, creating, in its wake, new vulnerabilities associated with any internet-based technology. This phenomenon has severe implications. How much consideration has been given to privacy and the evolving notion of personal data in this AI-powered health economy? And is our cyberinfrastructure ready to protect such trove of personal health data from hackers and industrial espionage? In this new race, will China and the U.S. have to constantly accelerate their rate of cyber and bio-innovation to be more resilient? Refining our models of genomics data protection will become a critical biosecurity issue.

Why is Chinese access to U.S. genomic data a national security concern?

Genomics and computing research is inherently dual-use, therefore a strategic advantage in a nation’s security arsenal.

Private firm puts $500K bounty on Signal, WhatsApp zero-day vulnerabilities

Zero-day vulnerabilities targeting popular secure messenger applications, like Signal, Telegram and WhatsApp, can fetch payments of up to $500,000 from Zerodium, a buyer and seller of zero-day research, based on a newly released list of available awards offered by the U.S. firm.

The market for zero-day vulnerabilities — an undisclosed software security hole that can be exploited by hackers — is notoriously rich and murky. Traders tend to operate away from public scrutiny for a number of reasons that make it difficult to learn about the market.

Although Zerodium isn’t known for the transparency of its business, the company’s listings for vulnerabilities provides a window into the supply and demand behind the vulnerability resale industry.

/* */