An early draft of the report, seen by WIRED, says that increased usage of end-to-end encryption would protect adults’ privacy at the expense of children’s safety, and that any strategy adopted by technology companies to mitigate the effect of end-to-end encryption will “almost certainly be less effective than the current ability to scan for harmful content.”.
The Games and Online Harassment Hotline (GOHH) launches today as a free text-based hotline that anyone can use to begin talking about the emotional issues that emerge all over the gaming industry.
Crucially, to enable end-to-end encryption, free users will need to submit and verify an identifying piece of data, like a phone number.
And though the exposed data included limited "personally identifying information," like real names, birthdays, or email addresses, the researchers warn that a motivated hacker could have used the photos and other miscellaneous information available to identify many users.
Despite becoming the first president ever to receive votes from both parties to convict and remove him from office in an impeachment trial, President Donald Trump today woke up in the White House unbound.
Sex worker Sydney Leathers hasn’t come across any deepfakes based on her porn scenes, but she is intimately familiar with what it feels like to have her work used to harass and debase another woman.
It aspires to be a central outlet for the study of all manner of internet abuse, assembling for visiting researchers the necessary machine learning tools, big data analysts, and perhaps most importantly, access to major tech platforms' user data—a key to the project that may hinge on which tech firms cooperate, and to what degree.
With a few seconds of physical access to a phone, even apps as common as Google Maps and Apple's Find My Friends can be tweaked to persistently share a user's location with another contact while offering the phone's owner no notification or warning, the researchers told me.
Tom Simonite covers artificial intelligence for WIRED.Using Amazon’s facial recognition technology, Spotlight quickly returned a list of online sex ads featuring the girl’s photo. Thorn has previously built language processing tools to help law enforcement officers find child abuse content on the dark web.
It’s been more than a year since Jack Dorsey publicly committed to “fixing” Twitter, which the CEO himself admits is toxic and full of problems he didn't anticipate.
Ahead of her talk, Galperin has notched her first win: Russian security firm Kaspersky announced today that it will make a significant change to how its antivirus software treats stalkerware on Android phones, where it's far more common than on iPhones.
Robson and Safechuck are the focus of the two-part, four-hour HBO documentary Leaving Neverland , in which they allege Jackson sexually abused them for the better part of a decade.
From Russian disinformation on Facebook, Twitter, and Instagram to YouTube extremism to drones grounding air traffic, Soltani argues, tech companies need to think not just about protecting their own users but about what he calls abusability: the possibility that users could exploit their tech to harm others, or the world.
New documents filed Monday with regulators in Poland, the UK, and Ireland claim that the way personal data is handled during the process of matching advertisements to ad slots does not comply with the European Union’s General Data Protection Regulation, a strict set of consumer privacy rules that went into effect in May. The documents focus on the categories that key players in the ad-tech industry have adopted to instantly match advertisers with appropriate users or content.
When the Academy Award nominations were announced Tuesday, I found comfort amid the nominees for Best Documentary—alongside Liu’s transformative portrait of abuse was Hale County This Morning, This Evening , director RaMell Ross’s impressionistic meditation on black southern life in Selma, Alabama.
Facebook wanted to make it clear that researchers shouldn't breach user data in the process of finding problems, but they should submit more nuanced types of data misuse reports whenever it was possible to document these complex interactions safely.Striking this balance is more challenging than it may initially seem, according to Alex Rice, CTO of the bug bounty development organization HackerOne. Rice consulted on Facebook's bug bounty when it launched in 2011, and says he was impressed to see it expand to accept privacy and third-party reports this year.