|Tuesday, December 18, 2018
You are here: Home » Technology

Technology

We all know what large technology companies do with people’s data: They use it to their advantage, they sell it to the highest bidder, they use to spy on users. As most readers already know, … Full article

Data management has become a social debate; unnecessarily so. Data belongs to users and that should be obvious. Companies should get it, governments should get it. No one should …

Have you ever heard the term ‘smart borders’? Probably not, until now; and it is about time you know what it is and what it is being used for. …

It seems that the use of Facebook by teenagers decreases faster among rich teenagers in the US. For years, the size and influence of Facebook increased at an amazing …

Almost one third of humanity has an account on the social network that is more popular than any existing religion. There are a few things that are shared by …

Fingerprinting and face recognition technology will allow for surveillance in a hyperconnected slave grid. It is called by many, “affective computing” or the ability to easily and instantly recognize … Full article

Some people call it personality-based advertising, but others call it invasion of privacy. Do you know how is it that those pesky, targeted ads that follow you everywhere you …

New law allows the United States to access data from companies and users located in the European Union. While in Europe parties focus on the entry into force of …

Public spaces are under constant surveillance. Hypervigilance is not so evident when we walk through the streets, but it exists: in addition to cameras, even the wastebaskets and telephone …

Facebook continues to defy all the limits of intrusion. It does not seem like an easy task to choose a filter for a “selfie”. The matter gets even more …

The former head of Operations of Facebook confesses he could not continue working there knowing what they were doing. Sandy Parakilas’ job was to monitor the privacy of Facebook …

Facebook admitted that they were performing psychological experiments on users. You may not be on social media yourself, but chances are your friends and family are. Some of us …

Perhaps the single most successful lie told by authorities worldwide is that people must be under continuous surveillance to remain safe. This excuse comes second to none, not even convenience, …

Facebook wants and has more information from you than your friends’ list or your geolocation. The controversy that is revolving around Facebook does not stop, at least not completely. …

Some of the most disgraceful crimes in history continue to be perpetrated by out-of-control forces. Although spying on someone’s private conversations may not be classified as a crime against …

The key that opened to door for Facebook is apparently, dopamine. To get people to stay on Facebook for a long time, you have to generate dopamine discharges. These …

Internet crime, cyberwar and cyberespionage are some of the most popular terms in the tech world. The boogeyman of the 20th century was so-called Islamic Terrorism. In the 21st century, …

Facebook excuses its censorship on a plea to “end disinformation” and “sensationalism” on the internet. It will not be enough to have a large audience or be registered as …

SÃO PAULO – Facial recognition technology comes loaded with comfort, yes, promises of greater security, okay. But it also comes loaded with a major, yet often ignored inconvenience: Violation …

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid …

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un …

A previous article explained Google’s transformation from search engine to online censor. Changes in its search algorithm makes it harder to access what it calls fake news, low-quality information …

So…some people actually want to be microchipped like a dog. They’re lining up for it. They’re having parties to get it done. It if isn’t available to them, they’re …

In case you don’t have enough to worry about with hackers getting into our power grids, cyber attacks taking down entire countries, and epic natural disasters, a newly discovered …

Were Hurricanes Harvey and Irma natural or engineered? It’s unclear. Geoengineering makes the latter possible. So-called High Frequency Active Auroral Research Program (HAARP technology) manipulates the atmosphere, climate, and …