login::  password::




cwbe coordinatez:
866
1551575
2111232

ABSOLUT
KYBERIA
permissions
you: r,
system: public
net: yes

neurons

stats|by_visit|by_K
source
tiamat
K|my_K|given_K
last
commanders
polls

total descendants::
total children::60
14 K

show[ 2 | 3] flat


zix0
danger maciak0
Enuma L]X[0
maaca0
bastien330
pht0
Burning A0
kocur_mosur[...0
week0
FlegiX0
cell0
-0
jurov0
Toth0
magus0
ulkas0
aarin0
s70
ni0
wasteman0
mammothica0
vrq[Locked_OUT]0
zoje2
kyberbubus2
azzazelo3
mirex3
total trash3
kkappabear4
Strapataaa4
kubriel4
s5
netvor6
mystickeprasa6
fefo6
wern7
grimo9
opytz9
jukebox9
vesnabesna9
darmozrac9
spiso10
Maverick_110
OsiRi$10
VII10
desconocida10
budha10
lubomier.sk10
10
soc11
antimon12
Ramon13
C[elkom]iny13
Adusik13
omfdzg13
danielovic13
neclovek13
kvitekmedovy13
~13
mrkqua13
.maio13
wsk13
slivka13
Islington13
smolkop13
4mood13
howienko13
sudcadred13
2pug13
brnd13
freezy13
MEDVEDIK13
pikseliahky13
clondyx13
pyxel13
hash.meer13
Martini13
harp13
crowd​ con...13
roger13
dusanson14
deborabezh14
Rekonoiterer14
Corvinku14
A.boy14
gucci14
acidrop15
Sienar15
mandalavandal15
drobna16
redered[Lock...19
hemish20
galantny elegan20
Joker20
ananas21
Harvie22
black tatiana22
mythea23
..............24
chaos walk w...24
milec26
drifter27
Ruza27
bujak29
KAM:O)29
endoza31
Refresh37
Blat38
ing39
LDuck47
gmb48
theresqa48
ab5trax49
mkrsp50
Killswitch51
...databazky s informaciami o nas vsetkych vznikaju a rastu a v nasledujucich rokoch to nebude inak. toto sa tyka policajnych databazach, vladnych databazach, marketingovych a inych komercnych databaz etc
co to znamena pre nas? blizi sa doba velkeho brata? vyvazia prinosy, ktore nam tento druh spolocnosti prinesie za moznu stratu sukromia, ci dokonca slobody? su data o nas dostatocne chranene proti zneuzitiu? to je len zopar issues..

toto forum by malo sluzit na zozbieranie informacii o roznych databazkach..kto vsetko zbiera o nas informacie? akym sposobom!? zabranit tomu v dnesnej dobe nemoze nikto..tak aspon vedzme kolko toho o nas vedia.)

"It doesn't always lead on to totalitarianism, but what if Adolf Hitler had sprung up with the technology we have now?" Stewart Room, information lawyer



some links:
Multistate Anti Terrorism Information Exchange
Must read
Rfid čipy - Posledná strata súkromia?

..everything with a bit of paranoia and conspiracy indeed.)

masters:marjan&a.boy




00000866015515750211123208405586
SYNAPSE CREATOR
 Prospero[Locked_OUT]      11.10.2017 - 14:37:25 (modif: 11.10.2017 - 14:37:45) [5K] , level: 1, UP   NEW  HARDLINK !!CONTENT CHANGED!!
fórum o digitálnom Sauronovi : ako a prečo vznikol, ako sa vyvíja a ako a prečo nakoniec natrčí kopytá

00000866015515750211123208395569
ulkas
 ulkas      19.09.2017 - 08:14:27 , level: 1, UP   NEW
The state of Illinois, which has six blockchain pilots underway, will partner with Utah-based Evernym for a birth registry pilot meant to individualize and secure identities... The endeavor, one of six distinct blockchain explorations Illinois began last summer with a working group, is expected to utilize the Sovrin Foundation's publicly available distributed identity ledger and expand upon accomplishments of the W3C Verifiable Claims Task Force, the state said... Recognizing that identity -- and, now, digital identity -- begin at birth, the state will explore using these technologies to create "a secure 'self-sovereign' identity for Illinois citizens during the birth registration process," it said in the announcement.

More from the Illinois Blockchain Initiative site:
Self-sovereign identity refers to a digital identity that remains entirely under the individual's control. A self-sovereign identity can be efficiently and securely validated by entities who require it, free from reliance on a centralized repository. Jennifer O'Rourke, Blockchain Business Liaison for the Illinois Blockchain Initiative commented, "To structurally address the many issues surrounding digital identity, we felt it was important to develop a framework that examines identity from its inception at child birth... Identity is not only foundational to nearly every government service, but is the basis for trust and legitimacy in the public sector."

In the proposed framework, government agencies will verify birth registration information and then cryptographically sign identity attributes such as legal name, date of birth, sex or blood type, creating what are called "verifiable claims" or attributes. Permission to view or share each of these government-verified claims is stored on the tamper-proof distributed ledger protocol in the form of a decentralized identifier... This minimizes the need for entities to establish, maintain and rely upon their own proprietary databases of identity information.

Evernym's "Chief Trust Officer" sees the program as "a major contribution to the larger effort of solving the online identity problem."

http://www.govtech.com/data/Illinois-Announces-Key-Partnership-in-Birth-Registry-Blockchain-Pilot.html

0000086601551575021112320839556908395573
ulkas
 ulkas      19.09.2017 - 08:16:19 [1K] , level: 2, UP   NEW
All the blockchain ideas are incredibly stupid. It's like a law of nature. Just take any idea, add "blockchain", "sovereign", "decentralized" and it becomes instantly trendy.

No, blockchain won't help you to establish your identity. It's your private key that you use to sign blockchain updates that establishes it. And if your key is stolen then it's game over for you - somebody ELSE will be owning your identity. Forever. With no recourse for you.

All realistic proposals (including the one in TFA) include key revocation protocols through some kind of central authority (i.e. government), at which point the whole system becomes indistinguishable from a simple centralized database.

0000086601551575021112320839556908395570
ulkas
 ulkas      19.09.2017 - 08:14:57 , level: 2, UP   NEW
Actually, since we're talking about data that can be changed and/or corrected over time, it is vital to store all this data as an initial set, accompanied by precisely timestamped changes. Because if something occurred when the data was incorrect, or with a previous version of the data, then that exact situation needs to remain preserved for posterity.

If I sign my name to a contract today and I legally change my name tomorrow, then that contract needs to remain valid. Having a tamper-proof ledger that correctly records what my name was at the time of the signing, and what my name is right now, means that no-one can claim the contract is no longer valid just because of the name change.

00000866015515750211123208390329
ulkas
 ulkas      04.09.2017 - 08:08:42 , level: 1, UP   NEW
Facebook doesn't only know what its 2 billion users "Like." It now knows where 7.5 billion humans live, everywhere on earth, to within 15 feet. From a report:
The company has created a data map of the planet's entire human population by combining government census numbers with information it's obtained from space satellites, according to Janna Lewis, Facebook's head of strategic innovation partnerships and sourcing. The mapping technology, which Facebook says it developed itself, can pinpoint any man-made structures in any country on earth to a resolution of five meters. Facebook is using the data to understand the precise distribution of humans around the planet.

https://www.cnbc.com/2017/09/01/facebook-has-mapped-human-population-building-internet-in-space.html


topic trochu clickbait, v principe spravili rozpoznavanie obrazu - fotografii zeme zo satelitov, a vedia tam rozoznat clovek postavene veci vacsie ako 5 metrov.

0000086601551575021112320839032908390348
dobso
 dobso      04.09.2017 - 09:25:05 , level: 2, UP   NEW
Asi vstupim k Vesmirni lide
Cipova totalita

00000866015515750211123208386124
SYNAPSE CREATOR
 ulkas      23.08.2017 - 09:54:53 (modif: 23.08.2017 - 09:55:04), level: 1, UP   NEW  HARDLINK !!CONTENT CHANGED!!
https://arxiv.org/abs/1407.6981
Randomized Aggregatable Privacy-Preserving Ordinal Response, or RAPPOR, is a technology for crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees. In short, RAPPORs allow the forest of client data to be studied, without permitting the possibility of looking at individual trees. By applying randomized response in a novel manner, RAPPOR provides the mechanisms for such collection as well as for efficient, high-utility analysis of the collected data. In particular, RAPPOR permits statistics to be collected on the population of client-side strings with strong privacy guarantees for each client, and without linkability of their reports. This paper describes and motivates RAPPOR, details its differential-privacy and utility guarantees, discusses its practical deployment and properties in the face of different attack models, and, finally, gives results of its application to both synthetic and real-world data.

ako rozumne celoplosne zbierat statisticke data od uzivatelov a pritom nevediet presne urcit, od koho to prislo, respektive co bolo obsahom od neho. firefox to chce teraz nasadit:


Mozilla preto použije techniku diferenciálnej ochrany súkromia. Pri týchto metódach sa dáta pred odoslaním spracujú tak, aby ich bolo možné hromadne analyzovať ale matematicky preukázateľne, do istej miery, neohrozovali súkromie jednotlivých užívateľov.

Spoločnosť konkrétne využije open source projekt Rappor od Google. Ten dáta pred odosielaním náhodne modifikuje tak, že modifikované dáta neumožňujú zistiť presné reportované dáta daného užívateľa.

Konkrétne k tomu používa najskôr tzv. Bloomov filter a následne dvojkrokové náhodné modifikovanie jednotlivých bitov zasielaných dát. Detailný technický popis Rappor je možné nájsť v článku Google.

Z počítača užívateľa tak odchádzajú dáta, ktoré neobsahujú priamo reportovanú hodnotu a túto úplne presne nie je možné z odosielaných dát ani zistiť.

Vzhľadom na spôsob akým sú dáta ale modifikované, pri štatistickom spracovaní zaslaných dát od mnohých užívateľov je možné zistiť štatistiky skutočných reportovaných dát veľkej skupiny užívateľov.

Táto metóda je tak lepšia ako zber dát bez snahy chrániť súkromie takýmto spôsobom. Reálna miera ochrany súkromia ale závisí na spôsobe a parametroch použitia tejto metódy, keď pri nevhodnom návrhu môže stále prezrádzať pomerne veľa. V minulom roku známy kryptológ Matthew Green napríklad upozorňoval, že metódy diferenciálnej ochrany súkromia zatiaľ neboli používané v reálnych produktoch, sú vždy kompromisom medzi presnosťou a ochranou súkromia a on zatiaľ nevidel takýto kompromis s dobrými výsledkami.

00000866015515750211123208374270
ulkas
 ulkas      25.07.2017 - 11:09:22 [1K] , level: 1, UP   NEW
The data breach exposed the names, photos and home addresses of millions of Swedish citizen, including fighter pilots of Swedish air force, members of the military's most secretive units, police suspects, people under the witness relocation program, the weight capacity of all roads and bridges, and much more
https://thehackernews.com/2017/07/sweden-data-breach.html?m=1


mnam mnam mnam. kolko to malo gb?

00000866015515750211123208333344
ulkas
 ulkas      24.04.2017 - 12:47:57 , level: 1, UP   NEW
http://eterni.me/

nejakym cudesnym sposobom chcu spravit vecneho avatara, alebo nejaky digitalny opis uzivatela. moze byt fajn. ja som uz dlho zvazoval nieco, ako doplnok do wikipedie, kde by sa spisal kratky zivotopis kazdeho cloveka, nech sa na neho nezabudne

00000866015515750211123208322820
SYNAPSE CREATOR
 ulkas      30.03.2017 - 13:26:17 [1K] , level: 1, UP   NEW  HARDLINK
Friday, March 31
World Backup Day 2017
http://www.worldbackupday.com/en/



THE WORLD BACKUP DAY PLEDGE

“I solemnly swear to backup my important documents and precious memories on March 31st.”

00000866015515750211123208321322
ulkas
 ulkas      28.03.2017 - 08:01:51 , level: 1, UP   NEW
The House oversight committee claims the FBI's facial recognition database is out of control, noting that "no federal law controls this technology" and "no court decision limits it." At last week's House oversight committee hearing, politicians and privacy campaigners presented several "damning facts" about the databases. "About 80% of photos in the FBI's network are non-criminal entries, including pictures from driver's licenses and passports," reports The Guardian. "The algorithms used to identify matches are inaccurate about 15% of the time, and are most likely to misidentify black people than white people." From the report:
"Facial recognition technology is a powerful tool law enforcement can use to protect people, their property, our borders, and our nation," said the committee chair, Jason Chaffetz, adding that in the private sector it can be used to protect financial transactions and prevent fraud or identity theft. "But it can also be used by bad actors to harass or stalk individuals. It can be used in a way that chills free speech and free association by targeting people attending certain political meetings, protests, churches, or other types of places in the public." Furthermore, the rise of real-time face recognition technology that allows surveillance and body cameras to scan the faces of people walking down the street was, according to Chaffetz, "most concerning." "For those reasons and others, we must conduct proper oversight of this emerging technology," he said.

00000866015515750211123208312773
SYNAPSE CREATOR
 ulkas      10.03.2017 - 10:50:49 , level: 1, UP   NEW  HARDLINK
The European Union's top court ruled in May 2014 that people could ask search engines, such as Google or Microsoft's Bing, to remove inadequate or irrelevant information from the web results produced from searches for people's names. Today, the court is limiting the so-called "right to be forgotten" principle, ruling that individuals cannot demand that personal data be erased from company records in an official register. Reuters reports:
In Thursday's ruling the European Court of Justice said that company registers needed to be public to ensure legal certainty and to protect the interests of third parties. Company registers only contained a limited amount of personal information and, as executives in companies should disclose their identity and functions, it said. This did not constitute too severe an interference in their private lives and personal data. However, the court said there might be specific situations in which access to personal data in company registers could be limited, such as a long period after a company's dissolution. But this should be determined on a case-by-case bas

00000866015515750211123208300878
ulkas
 ulkas      15.02.2017 - 13:34:29 [1K] , level: 1, UP   NEW
In a bid to get more Indians to have a birth certificate or any sort of ID card, India announced Aadhaar project in 2009. At the time, there were more Indians without these ID cards than those with. As a result of this, much of the government funding for the citizens were disappearing before they could see them. But according to several security experts, lawyers, politicians and journalists, the government is using poor security practices, and this is exposing the biometrics data -- photo, name, address, fingerprint, iris info -- of people at risk. More than 1.1 billion people -- and 99 percent of all adults -- in India have enrolled themselves to the system. From a report:
"There are two fundamental flaws in Aadhaar: it is poorly designed, and it is being poorly verified," Member of Parliament and privacy advocate, Rajeev Chandrasekhar told Mashable India. Another issue with Aadhaar is, Chandrasekhar explains, there is no firm legislation to safeguard the privacy and rights of the billion people who have enrolled into the system. There's little a person whose Aadhaar data has been compromised could do. [...] "Aadhaar is remote, covert, and non-consensual," he told Mashable India, adding the existence of a central database of any kind, but especially in the context of the Aadhaar, and at the scale it is working is appalling. Abraham said fingerprint and iris data of a person can be stolen with little effort -- a "gummy bear" which sells for a few cents, can store one's fingerprint, while a high-resolution camera can capture one's iris data.
The report goes on to say that the Indian government is also not telling how the data is being shared with private companies. Experts cited in the story have expressed concerns that those companies (some of which are run by people who were previously members of the team which designed the framework of Aadhaar) can store and create a parallel database of their own. On top of that, the government is making Aadhaar mandatory for availing several things including registration for nation-wide examinations, but in the beginning it promised Aadhaar will be used only to help poor get grocery at subsidized prices.

0000086601551575021112320830087808300881
ulkas
 ulkas      15.02.2017 - 13:36:27 , level: 2, UP   NEW
In India verification of identity has been a mess for a long time. Much of this complaint is true, and the Indian government can mess things up royally or vice-royally. But you can compare the new system with perfect system and carp about it. Perfection is the goal, but doing better than current version is the shipping criterion, as any coder knows.
Before aadhaar (meaning proof in Hindi, cognates with similar word in most of indian languages) it was an incredible mess. For most people "the ration card" issued to families to avail services of subsidized food served as a form of identity. Originally it had no photos, and it was one per family, not individual. But the state governments made some basic efforts to curtail fraudulent cards, so it served as an identity card. Voter registration lists were inflated. Migrant people did not have one. Credit worthiness could not be verified. So unsecured loans are never available from organized sector. All unsecured loans were made by local loan sharks who knew people personally. Almost all the commerce was done by cash. Allowed untaxed black money to mix freely with white money. So much so that the government had demonetized 500 Rs, and 1000 rs currency notes. Unless you can prove you had that note legally, you can't exchange it for the new legal tender. It did it back in 1976 too. The country was formed only in 1947.

The mess is far larger than any one can imagine or fix in short term. Finding fault with any new system is easy. Unless you offer viable solutions and work to address your concerns, one would think, it is just a troll or astro turf or feigned outrage.

Funny story: I was a lucky person with a propane gas cylinder account with a government owned gas supplier when I graduated from college. Propane gas stoves are the way most cooking is done in India for about half the population. It was a hot thing to have a gas cylinder account! All due to the foresight of my mom who "registered" my name using the ration card when I was in sixth or seventh grade. When I left for America, that account became very valuable. I gave the cylinder I had to my friend. So every time the cylinder would run out, he would use my name and get a replacement. Not sure if I gave my ration card to him too. When I ran into him some 15 years later he said, "I never forgot you. How could I ? Every 20 days, I had to call the Indane Gas company, and identify myself as 140mandak262jamuna!"

00000866015515750211123208294705
SYNAPSE CREATOR
 evadka[Locked_OUT]      06.02.2017 - 00:33:30 (modif: 06.02.2017 - 00:49:51) [18K] , level: 1, UP   NEW  HARDLINK !!CONTENT CHANGED!!
"Asi rok byl klid. V listopadu 2015 ohlásila radikálnější ze dvou kampaní za Brexit, „Leave.EU“, podporovaná Nigelem Faragem ze Strany za nezávislost Spojeného království (UKIP), že najala firmu zpracovávající big data, aby podpořila jejich online kampaň. Jednalo se o Cambridge Analytica. Hlavní přednost firmy: inovativní poltický marketing – tzv. microtargeting – měřením osobnostních rysů z digitálních stop, na základě psychometrických indikátorů.

Kosinskému začaly chodit e-maily s dotazy, co s tím má společného – slova Cambridge, osobnost a analýza v mnoha lidech ihned vyvolala vzpomínku právě na něj. Bylo to poprvé, co slyšel o této firmě, která si podle vlastních slov své jméno vypůjčila od svých prvních zaměstnanců, výzkumníků z univerzity v Cambridge. Zděšen se podíval na jejich webovou stránku. Byla jeho metodologie masově zneužita k politickým účelům?"

...

„Více méně každá zpráva, kterou Trump vydal, byla podložená daty,“ vzpomíná Alexander Nix. V den třetí prezidentské debaty mezi Trumpem a Clintonovou, Trumpův tým otestoval 175 tisíc různých variant reklam pro jeho argumenty, aby zjistil, jaké verze jsou nejlepší hlavně pro Facebook. Sdělení se lišila hlavně v naprosto mikroskopických detailech, aby cílila na příjemce optimálním psychologickým způsobem: jiné titulky, barvy, popisky, s fotkou nebo videem. Takto doladěná sdělení se dostanou i k nejmenším skupinám, vysvětlil nám Nix v rozhovoru. „Můžeme se cíleně zaměřit na vesnice, nebo bytové domy. I na jedince.“


http://a2larm.cz/2017/02/data-jez-obratila-svet-vzhuru-nohama/

00000866015515750211123208281588
SYNAPSE CREATOR
 ulkas      13.01.2017 - 12:46:31 , level: 1, UP   NEW  HARDLINK
corkovanie otlackov prsta z fotky.
https://phys.org/news/2017-01-japan-fingerprint-theft-peace.html#jCp
fingerprints.jpg

Could flashing the "peace" sign in photos lead to fingerprint data being stolen? Research by a team at Japan's National Institute of Informatics (NII) says so, raising alarm bells over the popular two-fingered pose. Fingerprint recognition technology is becoming widely available to verify identities, such as when logging on to smartphones, tablets and laptop computers. But the proliferation of mobile devices with high-quality cameras and social media sites where photographs can be easily posted is raising the risk of personal information being leaked, reports said. The NII researchers were able to copy fingerprints based on photos taken by a digital camera three meters (nine feet) away from the subject.

00000866015515750211123208215393
ulkas
 ulkas      15.09.2016 - 14:04:41 , level: 1, UP   NEW
minule sme sa bavili o tetovani/pocarbani tvare nejakou kamuflazou, aby to jednak vyzeralo stylovo a jednak pomylilo algoritmy na rozpoznavanie tvare.

no tak v tomto pripade dokaze algoritmus uhadnut na 71%, o koho ide. aj ked je hlava rozmazana alebo inak retusovana:
https://yro.slashdot.org/story/16/09/15/0046228/none-of-your-pixelated-or-blurred-information-will-stay-safe-on-the-internet
https://arxiv.org/pdf/1607.08438v1.pdf

00000866015515750211123208196033
ulkas
 ulkas      08.08.2016 - 13:59:49 , level: 1, UP   NEW
https://www.bloomberg.com/news/articles/2016-08-05/this-company-has-built-a-profile-on-every-american-adult

00000866015515750211123208176904
ulkas
 ulkas      30.06.2016 - 15:53:02 , level: 1, UP   NEW
https://developers.slashdot.org/story/16/06/30/0255250/2-million-person-terror-database-leaked-online

A 2014 version of the World-Check database containing more than 2.2 million records of people with suspected terrorist, organized crime, and corruption links has been leaked online. The World-Check database is administered by Thomson-Reuters and is used by 4,500 institutions, 49 of the world's 50 largest banks and by over 300 government and intelligence agencies.

00000866015515750211123208104141
SYNAPSE CREATOR
 ulkas      03.03.2016 - 10:20:37 [2K] , level: 1, UP   NEW  HARDLINK
http://karpathy.github.io/2015/10/25/selfie/

na konci sa da spravit krasny retusator selficiek, napriklad:
crops1.jpg

00000866015515750211123208082592
SYNAPSE CREATOR
 ulkas      29.01.2016 - 08:52:07 , level: 1, UP   NEW  HARDLINK
Európa si pripomína Európsky deň na ochranu osobných údajov
http://www.teraz.sk/magazin/europa-si-pripomina-europsky-den-osobne-/178526-clanok.html

00000866015515750211123208080895
ulkas
 ulkas      26.01.2016 - 14:33:45 , level: 1, UP   NEW
http://dsl.sk/article.php?article=17957
Japonci začínajú zadržaným fotiť tváre v 3D, zlepší to identifikáciu.


napriklad bezpecnostne kamery potom dokazu rozoznat cloveka aj z uhla

00000866015515750211123208031344
SYNAPSE CREATOR
 ulkas      06.11.2015 - 09:05:06 , level: 1, UP   NEW  HARDLINK
v skratke, zo 100 najvacsich americkych univerzit (podla poctu produkujuceho military personalu) je prvych 20 napriklad online-ovych. v praxi to znamena, ze kedysi existovalo 100 vojakov na 1 intel agenta, dnes je 100 intelligence analytikov na 1 vojaka. tito ludia su casto len vycvicene opice do vladneho aparatu (+klasicka storka o plytvani statnych penazi), ktori su napriklad nasadzovani do konfliktnych zon bez toho, aby napriklad mali ine blizsie vhodne vzdelanie (napriklad jazyk, historiu regionu a podobne). kedysi bolo podmienkou mat napriklad law-degree ak clovek chcel robit nejakeho uradnika, dnes uz nic take.
https://news.vice.com/video/the-most-militarized-universities-in-america-trailer




00000866015515750211123207885567
mirex
 mirex      10.04.2015 - 10:47:17 , level: 1, UP   NEW
Last Week Tonight with John Oliver: Government Surveillance (HBO)
https://www.youtube.com/watch?v=XEVlyP4_11M

Pekné na tom je to že:
1) nove interview so Snowdenom
2) preložené do ľudskej a vtipnej reči to, čo sleduje NSA v USA, čo všetko sa dostáva do NSA z tvojho g-mailu.

00000866015515750211123207854816
ulkas
 ulkas      02.03.2015 - 16:22:20 , level: 1, UP   NEW
Azerbaijan-600x337.png


pri brazdeni materialov o grafovej databaze som nasiel tento velmi zaujimavy koncept, ako sa snazili najst vztahy medzi prezidentom azerbajdzanu a sukromnymi firmami. ako nie je to rukolapny dokaz, ale imho toto ja drzim v hlave uz par rokov, ze keby napriklad tie opendata od amnesty na slovensku boli viac zdigitalizovane (nie v obrazkoch a podobne), tak vytvorit taky krasny prehlad, kto za koho kope.
http://graphgist.neo4j.com/#!/gists/c9092f6762f1a4c1dee0d4ac76f39b70

00000866015515750211123207818507
ulkas
 ulkas      23.01.2015 - 14:46:50 [3K] , level: 1, UP   NEW
rok dozadu bola o tom prednaska na ccc konferencii, vtedy to prezentovali nejake dve studentky ako koncept. tunak chalanko s tym pracuje tiez uz nejaky ten cas:


How vulnerable are Quora answers to automated writing style analysis?
main-qimg-4a39231e4c07d4eb575c4444178eb53f?convert_to_webp=true

00000866015515750211123206607205
SYNAPSE CREATOR
 mirex      17.04.2012 - 09:58:50 , level: 1, UP   NEW  HARDLINK
Green party politician Malte Spitz sued to have German telecoms giant Deutsche Telekom hand over six months of his phone data that he then made available to ZEIT ONLINE. We combined this geolocation data with information relating to his life as a politician, such as Twitter feeds, blog entries and websites, all of which is all freely available on the internet.

By pushing the play button, you will set off on a trip through Malte Spitz's life. The speed controller allows you to adjust how fast you travel, the pause button will let you stop at interesting points. In addition, a calendar at the bottom shows when he was in a particular location and can be used to jump to a specific time period. Each column corresponds to one day.
http://www.zeit.de/datenschutz/malte-spitz-data-retention

00000866015515750211123205432789
roger
 roger      06.07.2010 - 18:27:45 , level: 1, UP   NEW
7. Millennium Medical Management Resources: 180,111 Records Breached

According to the letters, the data, which was stolen from a portable hard drive in February, included names, diagnosis, medical records, Social Security numbers and health insurance information.

kolko sa asi tak stratilo v #1? :)

0000086601551575021112320543278905473420
mirex
 mirex      30.07.2010 - 20:57:45 , level: 2, UP   NEW
no a slovensko tiez smeruje ku elektronickym zdravotnym kartam.

00000866015515750211123205175931
SYNAPSE CREATOR
 juraj      14.02.2010 - 13:38:04 (modif: 14.02.2010 - 13:43:58) [35K] , level: 1, UP   NEW  HARDLINK !!CONTENT CHANGED!!
Výskumníci z počítačového laboratória Cambridge University pod vedením
prof. Anderson-a zverejnili ďalší zo série útokov na karty typu Chip
and PIN.

Vytvorením zariadenia, ktorý realizuje útok typu Man in the Middle
je možné získať z Chip and PIN karty peniaze bez nutnosti zadať PIN.

Zariadenie (na obrázku) pozostáva z falošnej karty napojenej na zariadenie,
do ktorého sa vloží pôvodná karta. Falošná karta je pritom úplne
pod kontrolou útočníka.

chipandpin_komponenty_utoku.png

Útok funguje nasledovne (jedná sa o zjednodušený pohľad, detaily
v zdroji článku):
1.) Zariadenie, ktoré sa snaží uskutočniť s kartou platbu sa najprv
falošnej karty opýta na správnosť zadania PINu. Falošná karta potvrdí
akýkoľvek PIN (napríklad 0000).

2.) Zariadenie pošle požiadavku na autorizáciu transakcie, ktorá
obsahuje sumu. Výstupom je potvrdenie čipu o autorizácii. Falošná
karta toto potvrdenie vydať nemôže, pretože nemá údaje na to potrebné.
Tie sa nachádzajú na pôvodnom čipe. Požiadavku teda len jemne
pozmení -- pridá informáciu, že sa jedná o transakciu, ktorá bude
overená podpisom. Požiadavku prepošle pôvodnej karte.

3.) Pôvodná karta potvrdí transakciu, keďže má byť overená podpisom,
nevyžaduje žiadny PIN.

4.) Potvrdenie falošná karta predá zariadeniu, ktoré platbu
požadovalo.

5.) Zariadenie si myslí, že transakcia prebehla v poriadku a bol
zadaný správny PIN. Karta si myslí, že vydala potvrdenie pre
transakciu overovanú podpisom. Nešťastný majiteľ pôvodnej karty
príde o svoje peniaze a útočník nemusel ani falšovať podpis
ani poznať PIN.


chipandpin_pin.png

Praktické použitie tejto techniky bude závisieť len od schopnosti
útočníkov miniaturizovať zariadenie (v prípade, že útok funguje
aj v bankomatoch ani toto nie je obzvlášť potrebné) a od toho,
ako na tento útok zareagujú vydavatelia Chip and PIN kariet.
Vymeniť všetky vydané karty ale nie je jednoduché.

Útok má však aj iný dôsledok: banky doteraz dávali zodpovednosť
na držiteľa karty, v prípade, že bol zadaný správny PIN. Ako však
vidíme, banka tento fakt v tomto prípade nemá ako overiť.

Autori štúdie tvrdia, že sú v kontakte s ľuďmi, ktorým banky
tvrdia, že ich transakcie boli verifikované PINom (a teda neručia
za peniaze vybraté po ukradnutí karty), ale podľa týchto ľudí
PIN nemali nikde napísaný a nikto ho nemohol uhádnuť ani nijak
získať. To by nasvedčovalo tomu, že tomuto útoku podobný útok
môže byť realizovaný útočníkmi aj v praxi.

Keďže sa nejedná o problém konkrétnych bánk, ale rôznych vydavateľov,
bude riešenie pravdepodobne zložité a tak skoro sa ho nedočkáme.

Zdroj: http://www.cl.cam.ac.uk/research/security/projects/banking/nopin/oakland10chipbroken.pdf

00000866015515750211123205120937
SYNAPSE CREATOR
 roger      13.01.2010 - 11:38:10 (modif: 13.01.2010 - 11:40:14) [2K] , level: 1, UP   NEW  HARDLINK !!CONTENT CHANGED!!
An anonymous Facebook employee has revealed that all user activity on the site is recorded and stored with as many as six copies of each photo retained.

... master password,... allow access to any user's profile
... ‘technically' accessible by any Facebook employee ...
... user messages are stored in a database, whether deleted or not ...

ako tu. :)

00000866015515750211123204976083
SYNAPSE CREATOR
 A.boy      26.10.2009 - 20:07:21 [1K] , level: 1, UP   NEW  HARDLINK