Your Eye Saves Passwords Myris Scan


I find it difficult to remember passwords for websites.

Even a simple password I forget.

Eye Scan
Screenshot by Michelle Starr/CNET Australia)

The pass words my son , son-in-law make me swoon, so complicated.

So I save them in a folder.

Simple, you would think.

I create folders in such a fashion with such exotic names I find it difficult to locate them fast.

For people like me, A Gadget is on the way.

Myris Scanner would do it for me.

Story:

There are a number of password vaults on the market that aim to keep your passwords secure, locked behind one single master password that can let you into all your accounts and profiles. While this is a good way to keep your information safe, you could, potentially, still be caught out by a keylogger.

 

But what if your accounts could only be unlocked by using a physical part of your body? The iris of your eye is unique to you, and it’s by scanning your eye that the company EyeLock aims to keep your passwords secure. Its mouse-sized device, Myris, can perform a quick eye-scan to verify your identity before letting you in.

Connecting to your computer via USB, it scans your eye at a rate of 20 frames per second, looking at over 240 points on the iris to generate a 2048-bit signature unique to each user. To get into your accounts, which are linked via an application, you need to physically scan your eye — photos and videos will not work. And, although there’s a chance you can get a false match, it’s very slim — just one in 2.25 trillion. According to EyeLock, only DNA is more accurate.

This means that you could set highly complicated passwords for your internet banking, VPNs, email, shopping websites and social networks and not have to worry about remembering them.

“Usernames and passwords will soon be a thing of the past, and EyeLock’s introduction of Myris brings us one step closer,” said EyeLock chief marketing officer Anthony Antolino. “People are required to remember dozens of passwords in an effort to secure their data, while organisations and individuals are in a constant struggle to keep their digital, social and financial transactions safe from compromise, breach and theft. Until service providers take the step to eliminate usernames and passwords, Myris enables users to set passwords as complex as they’d like and forget them once linked to the device.”

Myris will be made available globally later this year, although a definite release date and pricing are yet to be announced.

Enhanced by Zemanta
Advertisements

TV Collects Your Personal Data

One is used to websites tracking your History.

Then came the Mobiles.

There have been various regulations in force , on paper.

I have posted quite a few Posts on how to protect one’s personal Data.

Now the Spying enters your Home too.

There have been reports of LG TVs collecting personal data and forwarding to the Company.AP and Huffington Post report.


One is used to websites tracking your History.

Then came the Mobiles.

There have been various regulations in force , on paper.

I have posted quite a few Posts on how to protect one’s personal Data.

Now the Spying enters your Home too.

There have been reports of LG TVs collecting personal data and forwarding to the Company.AP and Huffington Post report.

Smart TV
Smart TVs Collect personal Data

SEOUL, South Korea (AP)LG Electronics Inc. said it is investigating a claim that some of its smart TVs send information on home viewing habits back to the company without consent.

The investigation comes after a British blogger, using network traffic analysis software, detailed how his LG smart TV logged the channels he was watching even after an information collection feature was disabled.

The blog said the TV also collected the names of files saved in an external USB hard drive plugged into the TV as well as the TV’s unique identification information.

The information also appeared to be sent to LG unencrypted.

The world’s second-largest TV maker said Thursday that customer privacy is its top priority and takes the issue very seriously.

An ad platform in LG smart TVs called LG Smart AD lets advertisers reach target audiences by utilizing device information, regional information and demographic details such as age and gender, LG says on its website.

However it was not immediately clear which features in LG’s smart TVs were triggering the data monitoring.”

..

Bell‘s privacy policy has been updated to indicate that it plans to start tracking customers and collect data on web and mobile usage, TV watching and phone calling habits.

Bell will start collecting customer data on Nov. 16, which it says will be used for improving network performance, creating marketing reports and selling targeted ads on mobile devices.

Websites visited, search terms used, TV shows watched, calling patterns and mobile usage will be collected and collated with what products and services customers pay for, where they live, their gender and age range.

Bell says the data it collects will not be linked with a customer’s identity. While customers can opt out of having their data used for personalized advertising and marketing reports, it appears they will be tracked regardless.

Bell did not immediately respond to an interview request.

Michael Geist, a law professor at the University of Ottawa and the Canada Research Chair in Internet and e-commerce law, said he’s shocked by the extent of the “data grab” that Bell is preparing to undertake.

“What Bell is able to aggregate, being as large as it is, is far more than any individual Internet company, even a company as large as Google,” Geist said.

http://www.huffingtonpost.com/huff-wires/20131121/as–skorea-smart-tvs-privacy/?utm_hp_ref=homepage&ir=homepage

http://montreal.ctvnews.ca/bell-to-start-tracking-customers-web-history-tv-viewing-unless-they-opt-out-1.1508083#ixzz2lGQQkyPL

Data Stealing Technology Gadgets

Recently I posted how the Indian Embassy in Washington DC was bugged by the NSA to steal Data from the Computer.

Here are the technologies/Gadgets behind Data Stealing Technologies from Computers.


Recently I posted how the Indian Embassy in Washington DC was bugged by the NSA to steal Data from the Computer.

Here are the technologies/Gadgets behind Data Stealing Technologies from Computers.

Story:

Stingray
Stingray that steals from Hard disk.
Click to Enlarge.

“Stingray”.

The Stingray has become the most widely known and contentious spy tool used by government agencies to track mobile phones, in part due to an Arizona court case that called the legality of its use into question. It’s a box-shaped portable device, sometimes described as an “IMSI catcher,” that gathers information from phones by sending out a signal that tricks them into connecting to it…

Stingray can also be used with software called “FishHawk,” (PDF) ..

Cost: $68,479 for the original Stingray; $134,952 for Stingray II

“Gossamer”

Data Stealing Technology
Gossamer steals Computer Data.Data Stealing Technology.

The Gossamer is a small portable device that can be used to secretly gather data on mobile phones operating in a target area. It sends out a covert signal that tricks phones into handing over their unique codes—such as the IMSI and TMSI—which can be used to identify users and home in on specific devices of interest. What makes it different from the Stingray? Not only is the Gossamer much smaller, but it can also be used to perform a denial-of-service attack on phone users, blocking targeted people from making or receiving calls, according tomarketing materials (PDF) published by a Brazilian reseller of the Harris equipment. The Gossamer has the appearance of a clunky-looking handheld transceiver. One photograph filed with the US Patent and Trademark Office shows it displaying an option for “mobile interrogation” on its small LCD screen, which sits above a telephone-style keypad.

First used: Trademark records show that a registration for the Gossamer was first filed in October 2001.

Cost: $19,696.

Source:

https://ramanan50.wordpress.com/?p=27123&preview=true

 

Smartphone Pictures Security Risk Verified True Video

There is a Video that one takes with a Smartphone poses a security risk as it reveals your location details and other data.

The YouTube video has gone viral and there are reports that this news item is a Hoax.

I checked and found that this is not a hoax.

The information seems to be authentic,


There is a Video that one takes with a Smartphone poses a security risk as it reveals your location details and other data.

The YouTube video has gone viral and there are reports that this news item is a Hoax.

I checked and found that this is not a hoax.

The information seems to be authentic,

As I am a non technical person, I advise caution.

Story:

Original Story:

Warning” If you, your kids or grand kids take pics from your phone—WATCH THIS!

This is truly alarming – please take the time to watch. At the end they’ll tell you how to set your phone so you don’t run this risk!

PLEASE PASS THIS INFO TO ANYONE YOU KNOW WHO TAKES PICTURES WITH THEIR CELL OR SMART PHONE AND POSTS THEM ONLINE.

I want everyone of you to watch this and then be sure to share with all your family and friends.

It’s REALLY important info, about what your posting things on your cell phones can do TO YOU!!!

Too much technology out there these days so beware………..

PLEASE TAKE THE TIME TO WATCH THIS VIDEO, AND TAKE THE RECOMMENDED PRECAUTIONS.

If you have children or grandchildren you NEED to watch this. I had no idea this could happen from taking pictures on the blackberry or cell phone. It’s scary.

http://kyeos.wordpress.com/2013/05/10/warning-if-you-take-photos-with-your-cell-phone/

Verification article. at http://www.snopes.com/crime/warnings/smartphonepix.asp

Find Original Phone Fake Mobile/Cell


There are fake mobile phones flooding the market.

Follow instructions to find if your Mobile Phone is original.

 

 

Google Glass Porn


Google Glass discouraged Porn Application

However,

Google Glass.
Google Glass view

Google couldn’t stop them from hiring porn stars to don the wearable technology and, well, do what porn stars do, and that’s exactly what happened. What would a porn shot with Glass look like? The trailer is a good indication without showing any actual porn, though the language is still pretty filthy and there’s a lot of moaning, so remember — NSFW.

Weirdly, this video does a decent job of showing off what Glass is capable of, but it also has fictional elements… to help move the story along I guess?

Porn stars James Deen and Andy San Dimas (oddest Bill & Ted reference ever?) use Glass’s long-since-cancelled facial recognition capabilities to identify each other. Deen also uses Glass to give him X-ray vision, but as far as we know that was never intended to be a feature. I might be missing the point here, but I kind of would have preferred it if they stuck to what Glass actually does.

Video is not posted here as it is NSFW.

Source:

http://www.geekosystem.com/google-glass-porno/

 

Gun Online From 3 D Printer

As the Gun Control issue is raging in the US, to do it techies have developed a Gun from 3 D printers from Computer files!

A Gun developed by a group of techies from 3 D printers almost entirely from 3 D printers went Online.

Demo of the Gun.


As the Gun Control issue is raging in the US, to do it techies have developed a Gun from 3 D printers from Computer files!

Gun made from 3 D Printer of a Computer
Gun from 3 D Printer.

A Gun developed by a group of techies from 3 D printers almost entirely from  3 D printers went Online.

Demo of the Gun.

 

 

Cody Wilson, founder of Defense Distributed, an organization dedicated to making it easy for anyone to 3-D print their own gun. It’s the opening line of a video showcasing Defense Distributed’s successful employment of a 3-D printer to manufacture a plastic high-capacity ammo clip for an AR-15 rifle.

Wilson is namechecking Democratic House Majority Leader Nancy Pelosi’s call for a “new conversation” on gun control in the wake of the Newtown, Conn., massacre. Wilson follows up his question by firing off a few rounds of ammunition, giving his handiwork an admiring look, and declaring: “Welcome to the age of the printed magazine.” The screen flashes a message: “Download your mag today.”

The 51-second video closes with Wilson eating a meal. An off-camera voice asks him: “So how does it taste?” His answer: “Tastes like Dianne Feinstein’s lunch.” It’s another anti-gun control broadside, a slam against the Democratic senator who plans to introduce legislation that would reinstate the ban on selling high-capacity ammunition magazines that existed from 1994 to 2004.

Wilson’s message could not be more blatant. In the age of cheap 3-D printers and open-source, easily downloadable design code, he is declaring that gun control is obsolete. So don’t even bother trying.”

How to make guns from 3 D Printer.

“But technologically, it’s still simple. That’s because the principle behind a gun isn’t too tricky: load a bullet into a reinforced tube, and whack the back of it hard. That’s an engineering problem street gangs in the 1950s managed to solve with wood, antenna housings and elastic bands, building “zip guns” to shoot at each other; and it’s also the basis for converted air rifles and cap guns. The difficult stuff – getting it to fire accurately, repeatedly and without jamming or blowing up in your face – is still a long way off for 3D printers. And even the best 3D-printed gun still relies on someone else to make the gunpowder.”

Sources.
http://www.salon.com/2013/01/25/will_computers_kill_gun_control/

http://www.guardian.co.uk/commentisfree/2013/may/06/3d-printer-gun-has-been-fired

 

%d bloggers like this: