Published inEntropic·Mar 7, 2020About Those Objects that Watch5th March, 2020 | Biometric Privacy | Entropic Photo by Geran de Klerk on Unsplash In our last article, we discussed the frontiers on which consumer smart devices are evolving, with the goal of increasing the surveillance resolution they have over individuals. In this article, we’ll focus on covert consumer…Privacy4 min readPrivacy4 min read
Published inEntropic·Jan 7, 20203 Prodigious Frontiers of Smart Device EvolutionBiometric Privacy | Entropic In this article, we’ll discuss the frontiers on which intelligent consumer devices are evolving. …AI8 min readAI8 min read
Published inEntropic·May 14, 2019Can You Protect a Photo from Facial Recognition?Biometric Privacy | Entropic In a previous article, we discussed how governments & the private sector are amassing photos of individuals from a diverse array of sources into “facial profiles”, for the purposes of building and tuning better facial recognition systems. …Biometrics6 min readBiometrics6 min read
Published inEntropic·Feb 22, 2019Have I Been Hacked? Asking Can Be PerilousCyberprivacy | Entropic Organizations that provide free and commercial “Have I Been Hacked?” or “Dark Web Scanning” services, including ones established immediately after the announcement of a data breach, can be justified by the best of intentions. …Cybersecurity10 min readCybersecurity10 min read
Published inEntropic·Jan 26, 2019Privacy Considerations for Choosing a Facial Recognition SystemBiometric Privacy | Entropic While Amazon, Facebook, Apple, Google, Microsoft, and of course the Chinese and US governments tend to get the most media attention these days when it comes to facial recognition, there are actually now more than 100 companies across the globe, along with many academic institutions who…Privacy8 min readPrivacy8 min read
Published inEntropic·Jan 9, 2019The Food of Facial Recognition: Your Regularly Updated Photos & VideosBiometric Privacy | Entropic In recent years, facial recognition technology has evolved significantly, and is greatly improving the ability to efficiently detect people in still images and video. The improvements in facial recognition, along with increased availability is now empowering more and more uses of the technology across various industries. …Privacy7 min readPrivacy7 min read
Published inEntropic·Dec 2, 2018Is AirDrop Over-Advertising Your Apple Device?Cyber Privacy | Entropic Jump ahead to… When properly configured, AirDrop is a handy and secure way to transfer items between Apple devices, such as URLs, Files, Photos and Notes. …Airdrop8 min readAirdrop8 min read
Published inEntropic·Nov 16, 2018Still Using Skype? Time to Abandon ShipCyber Privacy | Entropic Jump ahead to… Skype was originally pioneered by the Swede Niklas Zennström and the Dane Janus Friis, in cooperation with Ahti Heinla, Priit Kasesalu, and Jaan Tallinn, Estonians who developed the backend that was also used in the decentralized file sharing application Kazaa. Following it’s launch…Cybersecurity16 min readCybersecurity16 min read
Published inEntropic·Nov 3, 2018Is it Possible to Deter an Unwanted Photograph?Cyber Privacy | Entropic When it comes to having your photo taken by others, for many of us there is a right time and a wrong time. Some of the reasons why we may not be favorable to having our photo taken at any given time, include our perception of…Photography4 min readPhotography4 min read
Published inEntropic·Oct 26, 2018The Less Considered Perils of SMS Two-step AuthenticationInfrastructure | Entropic In previous articles, we have discussed different types of two-factor authentication (2FA) that are offered by Internet and social media companies to provide additional sign-in protection for your account. The well established SMS-based 2FA option has been the primary choice for thousands of companies, including financial institutions…2fa4 min read2fa4 min read