There are a number of password vaults on the market that aim to keep your passwords secure, locked behind one single master password that can let you into all your accounts and profiles. While this is a good way to keep your information safe, you could, potentially, still be caught out by a keylogger.
But what if your accounts could only be unlocked by using a physical part of your body? The iris of your eye is unique to you, and it’s by scanning your eye that the company EyeLock aims to keep your passwords secure. Its mouse-sized device, Myris, can perform a quick eye-scan to verify your identity before letting you in.
Connecting to your computer via USB, it scans your eye at a rate of 20 frames per second, looking at over 240 points on the iris to generate a 2048-bit signature unique to each user. To get into your accounts, which are linked via an application, you need to physically scan your eye — photos and videos will not work. And, although there’s a chance you can get a false match, it’s very slim — just one in 2.25 trillion. According to EyeLock, only DNA is more accurate.
This means that you could set highly complicated passwords for your internet banking, VPNs, email, shopping websites and social networks and not have to worry about remembering them.
“Usernames and passwords will soon be a thing of the past, and EyeLock’s introduction of Myris brings us one step closer,” said EyeLock chief marketing officerAnthony Antolino. “People are required to remember dozens of passwords in an effort to secure their data, while organisations and individuals are in a constant struggle to keep their digital, social and financial transactions safe from compromise, breach and theft. Until service providers take the step to eliminate usernames and passwords, Myris enables users to set passwords as complex as they’d like and forget them once linked to the device.”
Myris will be made available globally later this year, although a definite release date and pricing are yet to be announced.
There have been various regulations in force , on paper.
I have posted quite a few Posts on how to protect one’s personal Data.
Now the Spying enters your Home too.
There have been reports of LG TVs collecting personal data and forwarding to the Company.AP and Huffington Post report.
SEOUL, South Korea (AP) — LG Electronics Inc. said it is investigating a claim that some of its smart TVs send information on home viewing habits back to the company without consent.
The investigation comes after a British blogger, using network traffic analysis software, detailed how his LG smart TV logged the channels he was watching even after an information collection feature was disabled.
The blog said the TV also collected the names of files saved in an external USB hard drive plugged into the TV as well as the TV’s unique identification information.
The information also appeared to be sent to LG unencrypted.
The world’s second-largest TV maker said Thursday that customer privacy is its top priority and takes the issue very seriously.
An ad platform in LG smart TVs called LG Smart AD lets advertisers reach target audiences by utilizing device information, regional information and demographic details such as age and gender, LG says on its website.
However it was not immediately clear which features in LG’s smart TVs were triggering the data monitoring.”
Bell will start collecting customer data on Nov. 16, which it says will be used for improving network performance, creating marketing reports and selling targeted ads on mobile devices.
Websites visited, search terms used, TV shows watched, calling patterns and mobile usage will be collected and collated with what products and services customers pay for, where they live, their gender and age range.
Bell says the data it collects will not be linked with a customer’s identity. While customers can opt out of having their data used for personalized advertising and marketing reports, it appears they will be tracked regardless.
Bell did not immediately respond to an interview request.
Michael Geist, a law professor at the University of Ottawa and the Canada Research Chair in Internet and e-commerce law, said he’s shocked by the extent of the “data grab” that Bell is preparing to undertake.
“What Bell is able to aggregate, being as large as it is, is far more than any individual Internet company, even a company as large as Google,” Geist said.
It began: “The materials appearing on any Simply Put Solutions, Inc. the creators of Died in House found at http://www.diedinhouse.com (DIH) web site and/or owned application could include technical, typographical, or photographic errors.”
Simply put, I became concerned. But I read on: “DIH makes no representation, implied or expressed, that all information placed on any DIH web site or application is accurate. DIH does not warrant that any of the materials on its web sites or applications are accurate, complete, or current.”
I began to get that same creepy feeling again. Then I came to this sentence: “Died in House does not guarantee to have all deaths that have occurred in or at a specific address; it is an informational use only type of service.”
In the early days when most two-way radio communication used “Morse” code (radiotelegraph), operators used very short ‘procedural’ signals to save time. One such signal was the letter “R”, which was sent to indicate that a message had been received in full. As operators changed over to voice operation (radiotelephone), they kept the same letter, but pronounced it with a phonetic alphabet in which “R” was spoken as “roger“, still indicating that a message had been received.
Sometimes the radio operator is also the person addressed (for instance, perhaps an aircraft pilot). That person might add the response “Wilco“, which is short for “will comply”.
The term “over” is used with radio (or even telephone) connections when only one person can speak (successfully) at a time. It means “I have finished speaking for the moment, but am expecting your reply – go ahead”. “Out” means “I have finished speaking, and the conversation is finished; don’t reply”. They are not properly used together.
For example, when a pilot enters a controller’s airspace, the format is: Greeting. ID. Altitude. Or, as Jim tells me they teach it in pilot school, “Who they are; whoyou are; where you are; [and when necessary] what you want.” Thus:
Pilot: Denver Center. Cirrus 435 Sierra Romeo. Four-thousand five-hundred feet.
And the air traffic controller’s (ATC) response is: Acknowledgment. Altimeter reading (necessary gauge for determining altitude)
ATC: November 435 Sierra Romeo. Denver altimeter 30.14
And so on. Short. To the point. Unambiguous. No small talk to clog up the frequency.
Reinvention and resilience across the nation [But what’s this “November” business? Pilots identify themselves with their type of aircraft (for us, Cirrus) before the “tail number,” (for us, 435SR) which is their version of a license plate. In reply the controllers usually start with “November,” which is the phonetic code for N, which is the letter that indicates a U.S.-registered airplane. There are more wrinkles here, but enough for now.]
You might hear a little looser back and forth when, for example, the ATC is inquiring from pilots within his space about favorable altitudes to assign:
ATC: “How’s your ride up there?”
Pilots: “Light chop at three-five-zero“ or “Moderate turbulence at 5000 feet.”
Sometimes you hear a request for elaboration. An ATC might request the pilot to “Say type of aircraft,” since there are different types of Cirruses or Cessnas..
Or there might be a request for clarification. One day, I was surprised to realize that a little linguistic tic that I thought my husband had acquired was actually aviation talk for “repeat”. In place of the more colloquial (at least to me) “What was that?” Or, “I didn’t quite hear you,” or even “Sorry?” he now says “Say again” in all his normal conversation. He never said that before he became a pilot.
The variation in style is pretty small: a grizzled pilot might slur rather than enunciate. A cool one might swagger through litanies like Maverick or Iceman in Top Gun. An old-rules air traffic controller might stick to the absolutely disambiguating pronunciation for, say, distinguishing 9 and 5 with Niner and Fife
Sports fanatics: Near Boston, you have CELTS and BOSOX. Only in Texas you find: GOALL, PPUNT, DRPPD, FTBAL,TEXNN, COACH, QTRBK, TAKKL, RECVR, FMBLE and TCHDN. By Soldier Field; KUBBS and BEARS. In DC GIBBZ, SKINS, and MONKK. In Portland, the pair of TRAYL and BLAZR, balanced by the highbrow OMMSI,(Portland’sOregon Museum of Science & Industry) and POWLZ (the incredible Powell’s Bookstore).
Foodies: Near Kansas City, you get the regional SPICY, BARBQ, TERKY, SMOKE and RIBBS. And in Vermont and New Hampshire, HAMMM BURGR FRYYS
Guys or maybe Girls (I’m guessing the names are for girlfriends): SUSAN, SUSIE, SUSIQ, SUZAN, SUZEE, SUZEY, SUZIE, SUZIQ, SUZYQ, SUZYY, LIZIE, LIZZE, LIZZY, LIZZZ, ANNEE, ANNEY, ANNNE, ANNII, ANNYE.
Political junkies: By Andrews Air Force Base, you find DUBYA, BUUSH, FORRD, RREGN. No Democrats so far.
Goofballs: Near Pease, NH, there is a famous series of waypoints that read: ITAWT ITAWA PUDYE TTATT IDEED. Read that back, pilot!”
Now one can chat on International Calls in Local Call rates, by using a sticker.
This costs $35.
“It’s not hard to spend more on international roaming charges abroad than you did on the ticket there, but cloak your cell’s SIM card with a KnowRoaming sticker ($35) and you could be chatting andSnapchatting your heart out while only shelling out for local service. How? It recognizes when you’ve left your coverage area, and rather than switch to roaming, it seamlessly routes you through a local provider. They, in turn, get compensated for your talk and data usage via a prepaid account (which you manage via a dedicated app). And you won’t be need to use alias digits, either, since calls to your regular number are automatically forwarded.