235 apps attempt to secretly track users with ultrasonic audio

Ultrasonic beacons ( previously , previously ) let advertisers build an idea of when and where you use your devices: the sound plays in an ad on one device, and is heard by other devices. This way, they can associate two gadgets with a single user, precisely geolocate devices without aGPS, or even build graphs of real-world social networks. The threat was considered more academic than some, but more than 200 Android apps were found in the wild using the technique . In research sponsored by the German government [PDF], a team of researchers conducted extensive tests across the EU to better understand how widespread this practice is in the real world. Their results revealed Shopkick ultrasonic beacons at 4 of 35 stores in two European cities. The situation isn’t that worrisome, as users have to open an app with the Shopkick SDK for the beacon to be picked up. In the real world, this isn’t an issue, as store owners, advertisers, or product manufactures could incentivize users to open various apps as a way to get discounts. From the paper: While in April 2015 only six instances were known, we have been able to identify 39 further instances in a dataset of about 1,3 million applications in December 2015, and until now, a total of 234 samples containing SilverPush has been discovered. We conclude that even if the tracking through TV content is not actively used yet, the monitoring functionality is already deployed in mobile applications and might become a serious privacy threat in the near future Apparently it’s not very effective—consumer speakers and mics aren’t designed with ultrasonic use in mind and the authors say noise, audio compression and other factors “significantly affects the feasibility” of the technology—but the intent is clearly there on the part of advertisers and appmakers to make a stab at it. Annoyingly, there doesn’t seem to be a list of the apps that are doing this, but there is a reference to a McDonalds app. If an app asks for access to your device’s microphone, camera, etc., and you don’t know why, delete the app.

View article:
235 apps attempt to secretly track users with ultrasonic audio

235 apps attempt to secretly track users with ultrasonic audio

Ultrasonic beacons ( previously , previously ) let advertisers build an idea of when and where you use your devices: the sound plays in an ad on one device, and is heard by other devices. This way, they can associate two gadgets with a single user, precisely geolocate devices without aGPS, or even build graphs of real-world social networks. The threat was considered more academic than some, but more than 200 Android apps were found in the wild using the technique . In research sponsored by the German government [PDF], a team of researchers conducted extensive tests across the EU to better understand how widespread this practice is in the real world. Their results revealed Shopkick ultrasonic beacons at 4 of 35 stores in two European cities. The situation isn’t that worrisome, as users have to open an app with the Shopkick SDK for the beacon to be picked up. In the real world, this isn’t an issue, as store owners, advertisers, or product manufactures could incentivize users to open various apps as a way to get discounts. From the paper: While in April 2015 only six instances were known, we have been able to identify 39 further instances in a dataset of about 1,3 million applications in December 2015, and until now, a total of 234 samples containing SilverPush has been discovered. We conclude that even if the tracking through TV content is not actively used yet, the monitoring functionality is already deployed in mobile applications and might become a serious privacy threat in the near future Apparently it’s not very effective—consumer speakers and mics aren’t designed with ultrasonic use in mind and the authors say noise, audio compression and other factors “significantly affects the feasibility” of the technology—but the intent is clearly there on the part of advertisers and appmakers to make a stab at it. Annoyingly, there doesn’t seem to be a list of the apps that are doing this, but there is a reference to a McDonalds app. If an app asks for access to your device’s microphone, camera, etc., and you don’t know why, delete the app.

See more here:
235 apps attempt to secretly track users with ultrasonic audio

235 apps attempt to secretly track users with ultrasonic audio

Ultrasonic beacons ( previously , previously ) let advertisers build an idea of when and where you use your devices: the sound plays in an ad on one device, and is heard by other devices. This way, they can associate two gadgets with a single user, precisely geolocate devices without aGPS, or even build graphs of real-world social networks. The threat was considered more academic than some, but more than 200 Android apps were found in the wild using the technique . In research sponsored by the German government [PDF], a team of researchers conducted extensive tests across the EU to better understand how widespread this practice is in the real world. Their results revealed Shopkick ultrasonic beacons at 4 of 35 stores in two European cities. The situation isn’t that worrisome, as users have to open an app with the Shopkick SDK for the beacon to be picked up. In the real world, this isn’t an issue, as store owners, advertisers, or product manufactures could incentivize users to open various apps as a way to get discounts. From the paper: While in April 2015 only six instances were known, we have been able to identify 39 further instances in a dataset of about 1,3 million applications in December 2015, and until now, a total of 234 samples containing SilverPush has been discovered. We conclude that even if the tracking through TV content is not actively used yet, the monitoring functionality is already deployed in mobile applications and might become a serious privacy threat in the near future Apparently it’s not very effective—consumer speakers and mics aren’t designed with ultrasonic use in mind and the authors say noise, audio compression and other factors “significantly affects the feasibility” of the technology—but the intent is clearly there on the part of advertisers and appmakers to make a stab at it. Annoyingly, there doesn’t seem to be a list of the apps that are doing this, but there is a reference to a McDonalds app. If an app asks for access to your device’s microphone, camera, etc., and you don’t know why, delete the app.

Continued here:
235 apps attempt to secretly track users with ultrasonic audio

Few sad as About.com closure announced

When long-lived websites close down, they often give little notice, sending archivists scrambling to rescue its work for posterity. About.com, the venerable topic-mining hive abruptly put to death, seems to be a counter-example: a faceless mountain of bland, undifferentiated, half-plagiarized content that no-one seems sad to see vanish . Even its own CEO is plainly contemptuous of it. That’s why Vogel tells Business Insider he’s going to shut the site down as of May 2nd. “I got a phone call from Joey Levin, who is the CEO of IAC [About.com Group’s parent company]. He asked, ‘What do you think of About.com?'” Vogel told BI. “My answer — in perfect arrogance — was ‘I don’t.’ Who thinks of About.com? Nobody.” But not all of About.com is going away necessarily. Vogel says he will take parts of the website and turn them into separate niche verticals, then announce a new name for the overarching brand at a conference in New Orleans. “A year ago we were a general interest site,” Vogel told The Drum in March. “We were not growing. In fact, we were kind of shrinking. We had great content, but we were doing the wrong thing.” About.com was one of the earliest big web successes to cash out: to Prime Media in 2000 for $690m, then to the New York Times in 2005 for $410m, IAC in 2012 for $300m, and now to the deep void for sweet fuck all—but also the hope that the staff and infrastructure can be used to launch something new. “I’m not going to be the guy who ruined About.com,” Vogel told Business Inside. “ It’s already ruined, so this is all upside here. ”

More:
Few sad as About.com closure announced

Internet Archive to ignore robots.txt directives

Robots (or spiders, or crawlers) are little computer programs that search engines use to scan and index websites. Robots.txt is a little file placed on webservers to tell search engines what they should and shouldn’t index. The Internet Archive isn’t a search engine, but has historically obeyed exclusion requests from robots.txt files. But it’s changing its mind, because robots.txt is almost always crafted with search engines in mind and rarely reflects the intentions of domain owners when it comes to archiving. Over time we have observed that the robots.txt files that are geared toward search engine crawlers do not necessarily serve our archival purposes. Internet Archive’s goal is to create complete “snapshots” of web pages, including the duplicate content and the large versions of files. We have also seen an upsurge of the use of robots.txt files to remove entire domains from search engines when they transition from a live web site into a parked domain, which has historically also removed the entire domain from view in the Wayback Machine. In other words, a site goes out of business and then the parked domain is “blocked” from search engines and no one can look at the history of that site in the Wayback Machine anymore. We receive inquiries and complaints on these “disappeared” sites almost daily. A few months ago we stopped referring to robots.txt files on U.S. government and military web sites for both crawling and displaying web pages (though we respond to removal requests sent to info@archive.org). As we have moved towards broader access it has not caused problems, which we take as a good sign. We are now looking to do this more broadly. An excellent decision. To be clear, they’re ignoring robots.txt even if you explicitly identify and disallow the Internet Archive. It’s a splendid remember that nothing published on the web is ever meaningfully private, and will always go on your permanent record.

Read the original post:
Internet Archive to ignore robots.txt directives

Final Stage: incredible graphical demo shows what you can do with 4 kilobytes of source code

Graphical demos created with severe code-length limitations sometimes betray the techniques used to fit a world into a few kilobytes: tessellating textures, featureless fractals, repetitive sequences, and so on. Final Stage , by 0x4015 , is not one of those demos. [ via ] Here it is rendered on a XEON x560 with a GTX 1070 video card and 24GB of RAM. Check out all the other uploads from the Revision 2017 demoparty. Eidolon , by Poo-brain, won in the 64k category: https://www.youtube.com/watch?v=-bwLkEwLIgQ

View original post here:
Final Stage: incredible graphical demo shows what you can do with 4 kilobytes of source code

Inuit cartography: maps carved in driftwood

The Inuit carve portable, waterproof, floating maps out of driftwood for use in navigating the littoral. These three wooden maps show the journey from Sermiligaaq to Kangertittivatsiaq, on Greenland’s East Coast. The map to the right shows the islands along the coast, while the map in the middle shows the mainland and is read from one side of the block around to the other. The map to the left shows the peninsula between the Sermiligaaq and Kangertivartikajik fjords. From The Decolonial Atlas , an antidote to all the other ones: Kurdistan in Kurdish , Lakota Territory , Agricultural Maps .

Read more here:
Inuit cartography: maps carved in driftwood

Rabbit hole in England leads to 700-year old Knights Templar cave

The BBC reports that an ” ordinary rabbit’s hole in a farmer’s field leads to an underground sanctuary once said to be used by the Knights Templar .” Michael Scott, from Birmingham, went to photograph the caves after seeing a video of them online. He said: “I traipsed over a field to find it, but if you didn’t know it was there you would just walk right past it. Considering how long it’s been there it’s in amazing condition, it’s like an underground temple.” The tunnel leads to a network of walkways and arches carved out of sandstone, as well as a font. The cave is evidently a hot place to hang out if you’re a witch . Be sure to ask the property owners nicely and clean up after the ritual is complete. One year after Christmas, the labyrinth of intricately carved chambers was found to be filled with candles, sinister symbols scrawled on the walls and more besides. The owners of the site, hidden in dense woodland ten miles from Wolverhampton, decided enough was enough when two warlocks knocked on the door – and asked for their robes back. The red-faced pair had left the garments behind after a ritual.

See the original article here:
Rabbit hole in England leads to 700-year old Knights Templar cave

Germans warned to DESTROY Cayla, network-connected doll that spies on children

It’s called Cayla , it’s about a foot tall, and it can be used to listen to and talk to the child playing with it. But who is doing the listening? Anyone in Bluetooth range, reports Germany’s Federal Network Agency (Bundesnetzagentur). An official watchdog in Germany has told parents to destroy a talking doll called Cayla because its smart technology can reveal personal data. … The Vivid Toy group, which distributes My Friend Cayla, has previously said that examples of hacking were isolated and carried out by specialists. However, it said the company would take the information on board as it was able to upgrade the app used with the doll. But experts have warned that the problem has not been fixed. The Cayla doll can respond to a user’s question by accessing the internet. For example, if a child asks the doll “what is a little horse called?” the doll can reply “it’s called a foal”. Watch the BBC’s video of Cayla, in its squeaky, sinister voice, say “I’ve been hacked to say all sorts of scary things.” https://www.youtube.com/watch?v=U0Y2KUN6XPM Cayla was on Boing Boing last year when the FCC received complaints about it. Cayla is on Amazon for $45 . It’s so easy to hack that everyday YouTubers are at it! https://www.youtube.com/watch?v=EvMb_TusPPs

Read More:
Germans warned to DESTROY Cayla, network-connected doll that spies on children