If hackers can hide tumors in scans, what else can they hide?

Researchers demonstrate a novel attack on medical devices by using deep learning.

Source: If hackers can hide tumors in scans, what else can they hide?

Advertisements

Schiff and Nunes: Mueller ‘Must Brief’ Intel Committee—And Turn Over All His Materials

But the more revealed, reveals more unknowns that Mueller could or did not figure out.

The intel committee’s top Republican and top Democrat have been openly fighting for more than a year. But there’s one thing they agree on: They need to hear from Robert Mueller.

Source: Schiff and Nunes: Mueller ‘Must Brief’ Intel Committee—And Turn Over All His Materials

WikiLeaks and the Lost Promise of the Internet

Julian Assange’s story is also the story of how the utopian possibilities of the internet turned into something much bleaker and more frightening.

Source: WikiLeaks and the Lost Promise of the Internet

One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

In a major ethical leap for the tech world, Chinese start-ups have built algorithms that the government uses to track members of a largely Muslim minority group.

Source: One Month, 500,000 Face Scans: How China Is Using A.I. to Profile a Minority

Here Are The Funniest (And Most NSFW) Reactions To The Black Hole Image

Yesterday we saw the first ever image of a black hole (or at least the event horizon of a black hole). It was a monumental milestone for science and for just one day everybody put aside their snark and gazed in awe and wonder at the first-ever view of one of the weirdest objects in the universe.

Just kidding, they took the piss out of a black hole.

After the light traveled 54 million light-years across the universe it arrived on Earth where we immediately turned it into a Goatse meme (which you should never Google if you don’t already know what it is by the way)

Source: Here Are The Funniest (And Most NSFW) Reactions To The Black Hole Image

Julian Assange Got What He Deserved

Don’t continue to fall for his phony pleas for sympathy, his megalomania, and his promiscuity with the facts.

Source: Julian Assange Got What He Deserved

Data Collection Standards in Privacy Legislation: Proposed Language

A standard on collection should be rooted in recognized principles on collection of personal information and add some general guideposts to inform the application of the principles in the infinitely …

Source: Data Collection Standards in Privacy Legislation: Proposed Language

Australia’s New Social Media Law Is a Mess

The post-Christchurch law creates new offenses and liability, including imprisonment and huge fines for failing to take down violent content. But it is riddled with ambiguities.

Source: Australia’s New Social Media Law Is a Mess

The Consequences of Legislating Cyberlaw After Terrorist Attacks

In an extension of the article’s logic, and on a slightly more sinister side, the following statement would have been considered outlandish and a movie fiction conspiracy theory to an uninitiate just a little over a year ago: how hard is it for a any interest — political, religious, idealogical, a mix of all,  etc.  group or sub-group — desiring accumulation of power or influence through any means including legislation, surveillance, or social division or unrest it can benefit from, to persuade, collude, coordinate with or ask a foreign power, entity or interest with access to or influence in FTOs or TCOs, to effectuate (catastrophic) events that can facilitate or lead to those outcomes? A lot easier than the 2016 election interference which went on mostly by independent opposing self interests. For free, personal desire, vengeance, a favor or return of one?

Hastily drafted laws passed under pressure tend to create new problems while doing little to counter threats from terrorists and violent extremists.

Source: The Consequences of Legislating Cyberlaw After Terrorist Attacks