I spoke to a number of Twitter users who received the notice. A couple are engaged in activism and are connected to the Tor Project in some capacity. A few are located in Canada, and vaguely associated with the security community at large. However, I could not determine any common factors between all recipients. They all received the notice around the same time, between 5:15 and 5:16 PM EST.
Les visages des 90'000 fans réunis à Donnington Park pour applaudir Kiss, Muse et Slipknot auraient ainsi été scannés, et leurs traits auraient été comparés aux photos contenues dans la base de données d’Europol.
==========================
Des Hacks:
http://cons.wonderhowto.com/how-to/stop-facial-recognition-software-from-finding-out-who-you-are-camera-0138980/
http://h4cker.net/
http://www.cnet.com/news/urme-anti-surveillance-mask-lets-you-pass-as-someone-else/
http://www.theatlantic.com/features/archive/2014/07/makeup/374929
D'autres choses sur le sujet:
https://www.eff.org/deeplinks/2014/04/fbi-plans-have-52-million-photos-its-ngi-face-recognition-database-next-year
http://alireailleurs.tumblr.com/post/121737023394
http://www.iis.fraunhofer.de/en/ff/bsy/tech/bildanalyse/shore-gesichtsdetektion.html
http://www.rslnmag.fr/post/2014/07/18/En-Grande-Bretagne-la-reconnaissance-faciale-fait-avancer-les-enquetes-policieres.aspx
http://www.lemonde.fr/pixels/article/2014/06/02/pourquoi-la-nsa-aspire-des-millions-de-photos-de-visages-sur-le-web_4429961_4408996.html
http://alireailleurs.tumblr.com/post/84310492867
http://www.atelier.net/trends/articles/controle-regulation-necessaires-encadrer-pratiques-policieres-20_425223
http://www.slate.fr/story/58455/facebook-reconnaissance-faciale
Relaxé en première instance, condamné en appel, Olivier Laurelli (également connu sous le pseudonyme de Bluetouff), a de nouveau été "condamné en cassation pour avoir téléchargé des documents via Google", comme l'a titré Le Parisien. J'avoue : j'avais moi aussi découvert il y a quelques mois, par hasard et via Google, des documents et données de l'armée française auxquels je n'étais pas censé pouvoir accéder. Pour autant, je ne suis pas un "voleur". Explications techniques à destination des magistrats (et de quelques autres).
Nous parlerons de manipulation mentale via trois domaines fortement imbriqués : le commercial, avec ses marques, ses produits, ses magasins et ses techniques de vente ; les médias, tout particulièrement la télévision ; et le travail, à travers le prisme de l’expérience de Milgram, dont l’expérience essentielle introduira cet ouvrage. https://hackingsocialblog.files.wordpress.com/2015/05/lhomme-formatc3a9-red-2-0.pdf https://hackingsocialblog.files.wordpress.com/2015/05/lhomme-formatc3a9-red-2-0.pdf - via shaarli.fr -
It has entered the general consciousness by now that North Korea hacked Sony. The FBI has said they’re sure, and as the classic example of a story too good to check, the media has run with it. Journalists use it as a casual example, it’s in the first draft of history to be sure. It’s turning up as a cultural trope, something we all know. It’s the set up for jokes. But we’re not sure that it happened that way, at all. The evidence is not only thin, it points in far too many directions — many of them not at North Korea. The truth is, like most hacking attacks, we will probably never be sure who hacked Sony.
Last August, at Defcon, the hacker conference in Las Vegas, a boyish 40-year-old engineer and security researcher named Michael Ossmann stood on the stage of a lecture hall, about to detail a stunning new set of tools designed for spying on a wealth of electronic devices.
libtins is a high-level, multiplatform C++ network packet sniffing and crafting library.
Its main purpose is to provide the C++ developer an easy, efficient, platform and endianess-independent way to create tools which need to send, receive and manipulate network packets.
It uses a BSD-2 license and it's hosted at github.
The PC Engines WRAP system board gives network OEMs a cost-effective SBC platform for their value-added software, such as wireless routers, firewalls, load balancers, VPN, industrial Ethernet, or other special purpose network devices. || WRAP is END OF LIFE, as the AMD SC1100 CPU is no longer available. || Besoin de garder la doc sous la main, pour en avoir récupéré quelques un
Exploitation d'une vulnérabilité dans l'interface web des routeurs WRT120N pour accéder aux pages d'admin.
The 30th Chaos Communication Congress (30C3) is an annual four-day conference on technology, society and utopia. The Congress offers lectures and workshops and various events on a multitude of topics including (but not limited to) information technology and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.
http://streaming.media.ccc.de/
https://wtf.muling.lu/30c3/
http://media.ccc.de/browse/congress/2013/index.html
«Les actes de désobéissance civile et d’action directe pour lesquels je suis condamné aujourd’hui sont en accord avec les principes de communauté et d’égalité qui guident ma vie.»