Browsing Posts tagged Technology

Shahid Buttar, Bill of Rights Defense Committee (BORDC) joins Thom. All across America – law enforcement agencies are using a special technology to collect information from your cell phones. What is Stingray technology – how is it used – and why is everyone trying to keep it a secret? Source. Tweet

FacebookTwitterGoogle+TumblrRedditHacker News

eMotionButterflies are ultra-light robots that flutter on uncanny flapping wings and incorporate a system of ten infrared cameras into a guided and monitored “intelligent networking system” that allows them to behave like a real-life flock. “The eMotionButterflies impress with an intelligently employed mechanical system and the smallest possible power units in the tightest space,” Festo writes on their site. “The reduced use of materials enables the true-to-nature flying behaviour.” The bionic bugs aren’t the only animal-inspired robots Festo is launching, either. Yesterday’s unveiling also included a pack of highly-organized robotic ants, BionicANTs, and the FlexShapeGripper, […]

FacebookTwitterGoogle+TumblrRedditHacker News

The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing vulnerabilities, they push the Internet to become stronger and healthier, wielding their power to create a better world. TED. Tweet

FacebookTwitterGoogle+TumblrRedditHacker News

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics. Source. Tweet

FacebookTwitterGoogle+TumblrRedditHacker News

An update on global ID

Half a century ago people had to be reassured their social security card was not being used for identification. Now there are federally standardized and globally synchronized ID cards, government-sponsored online ID projects, DNA databases, and even secret databases of your newborn baby’s genetic information and nobody bats an eyelid. How did we get here, and how can we break this conditioning? Source. Tweet

FacebookTwitterGoogle+TumblrRedditHacker News
© 2015 Loss of Privacy Powered by WordPress using the Jishnu theme.