Behind the one-way mirror: A deep dive into the technology of corporate surveillance ~tech privacy Article 13 070 words 9 votes
In a major ethical leap for the tech world, Chinese start-ups have built algorithms that the government uses to track [Uighurs] members of a largely Muslim minority group ~tech Article 5665 words, published Apr 14 2019 13 votes
I got access to my secret consumer score. Now you can get yours, too. ~finance Article 1631 words 14 votes
Chinese professor sues wildlife park after it introduces facial recognition entry system ~tech privacy Link 6 votes
Australia's idiotic war on porn returns, this time using facial recognition ~tech internet privacy Article 476 words 16 votes
Soccer team Brøndby IF in Denmark is using facial recognition to stop unruly fans ~sports.football Article 1116 words 4 votes
Student tracking, secret scores: How college admissions offices rank prospects before they apply ~life education.higher Article 3116 words 15 votes
NSA whistleblower dropped from Australian cyber conference at the last minute ~tech security.cyber Article 500 words 6 votes
President Trump tweets sensitive surveillance image of Iran ~news iran usa politics Article 705 words 37 votes
Why protests are becoming increasingly faceless ~tech Article 1977 words, published Aug 25 2019 10 votes
Mozilla takes action to protect users in Kazakhstan ~tech privacy security Article 349 words 26 votes
As authoritarian governments surveil the internet, open source projects decide how to respond ~tech internet privacy Article 808 words 7 votes
Swedish police want to introduce facial recognition technology to fight crime ~tech Article 217 words 3 votes
How US tech giants are helping to build China’s surveillance state ~tech google Article 1935 words, published Jul 11 2019 8 votes
Gotta catch 'em all: Understanding how IMSI-catchers exploit cell networks ~tech privacy security Article 6536 words, published Jun 28 2019 4 votes
Middle East dictators buy spy tech from company linked to IBM and Google ~tech google Article 1019 words 8 votes
Gotta catch 'em all: Understanding how IMSI-catchers exploit cell networks ~tech privacy security Article 6536 words, published Jun 28 2019 6 votes
China's border guards are installing malware onto the phones of travellers crossing its border ~tech Article 1358 words 8 votes
In response to mass shootings, some schools and hospitals are installing microphones equipped with algorithms ~tech Article 1964 words 12 votes
When Myspace was king, employees abused a tool called ‘overlord’ to spy on users ~tech privacy social media Article 1201 words 8 votes
Masks, cash and apps: How Hong Kong’s protesters find ways to outwit the surveillance state ~news hong kong china Article 1494 words 10 votes
Australian Home Affairs Minister Peter Dutton confirms plan to create new spying powers still being considered ~society politics Article 719 words 9 votes
Big mood machine - Spotify pursues emotional surveillance for global profit ~tech Article 3839 words 12 votes
Against advertising: Advertisers thrive on perpetuating a system that is ravaging the planet. We can do without them — and a lot of the junk they’re trying to sell us. ~design advertising Article 1571 words 33 votes
'It's time for us to watch them': App lets you spy on Alexa and the rest of your smart devices ~tech privacy internet Article 258 words, published Apr 25 2019 11 votes
Snapchat employees abused data access to spy on users ~tech privacy social media Article 1309 words 11 votes
San Francisco has banned government and police use of face surveillance technology ~tech privacy Article 304 words 25 votes
ICE is monitoring and targeting immigration activists ~life Article 1203 words, published Apr 30 2019 5 votes
Chinese surveillance near Papua New Guinea expanding as Australia and US begin Manus Island naval upgrades ~news china australia usa papua new guinea.manus island politics Article 918 words 6 votes
Austrian government seeks to eliminate internet anonymity, with severe penalties ~tech internet privacy Link 15 votes
Chicago’s ankle monitors can call and record kids without their consent ~tech privacy Article 7 votes
The illusion of a “marketplace of ideas” and the right to truth ~humanities Article 5157 words, published Feb 20 2019 8 votes
Grassland: Inverse surveillance via a P2P network of camera + computer vision nodes, serving as a public record of the movments of people and objects. ~tech privacy Link 6 votes
Oil traders are now watching workers’ phones to spot problems at refineries ~tech privacy Article 5 votes
Documents reveal ICE using driver location data from local police for deportations ~tech Article 1320 words, published Mar 13 2019 5 votes
Documents show the US government created a secret database of activists, journalists, and social media influencers tied to the migrant caravan and in some cases, placed alerts on their passports ~news usa journalism politics Article 2407 words 12 votes
China blocks 17.5 million plane tickets for people without enough 'social credit' ~news china Article 494 words 46 votes
The real reason why Facebook and Google won’t change ~tech facebook google privacy social media Article 1302 words 17 votes
Why humanitarians are worried about Palantir’s new partnership with the UN ~tech privacy Article 1803 words 8 votes
How all-knowing smartphones could become the Pentagon’s employee access cards ~tech security smartphones Article 414 words 9 votes
Hundreds of Bounty Hunters Had Access to AT&T, T-Mobile, and Sprint Customer Location Data for Years ~tech privacy Article 2864 words 10 votes