Η Αρχή Προστασίας Προσωπικών Δεδομένων με την υπ΄ αριθμ 1/2017 γνωμοδότησή της ζητεί από τον ΟΑΣΑ αυστηρές εγγυήσεις προστασίας των προσωπικών δεδομένων προκειμένου να δώσει το πράσινο φως για το ηλεκτρονικό εισιτήριο για όλα τα Μέσα Μαζικής Μεταφοράς, καθώς όπως σχεδιάζεται περιλαμβάνει πληθώρα προσωπικών δεδομένων.
Αναλυτικότερα από την Αρχή ζητήθηκε να γνωμοδοτήσει, όπως απαιτεί η νομοθεσία για την επεξεργασία των προσωπικών δεδομένων στο πλαίσιο του νέου Ενιαίου Αυτόματου Συστήματος Συλλογής Κομίστρου για τις εταιρείες του Ομίλου ΟΑΣΑ, δηλαδή, το ηλεκτρονικό εισιτήριο.
The international hit HBO series Game of Thrones, adapted from George R. R. Martin’s epic fantasy novel series A Song of Ice and Fire, features interweaving plotlines and scores of characters. With so many people to keep track of in this sprawling saga, it can be a challenge to fully understand the dynamics between them.
To demystify this saga, we turn to network science, a new and evolving branch of applied graph theory that brings together traditions from many disciplines, including sociology, economics, physics, computer science, and mathematics. It has been applied broadly across the sciences, the social sciences, the humanities, and in industrial settings.
In this article we perform a network analysis of Game of Thrones to make sense of the intricate character relationships and their bearing on the future plot (but we promise: no spoilers!).
Tor, the network used specifically for privacy and anonymity, just warned users of an attack meant to deanonymize people on the service. Anyone who used Tor from February 2014 through this July 4 can assume they were impacted.
This is very bad news for Tor, which is heralded for its ability to conceal users from surveillance.
Software maker Avast is calling the security and thoroughness of Android’s factory reset feature into serious doubt today. The company says it purchased 20 used Android smartphones online and set out to test whether personal user data could be recovered from them. Each phone had been reset prior to being sold, according to Avast, so in theory the test should have failed miserably. But that’s not what happened.
Using widely available forensic software, Avast says it was able to successfully pull up over 40,000 photos previously stored on the phones. Many of those featured children, and others were sexual in nature with women in “various stages of undress” and hundreds of “male nude selfies.” The company also managed to recover old Google search queries, emails, and texts. All told, Avast successfully identified four original phone owners using data that those people falsely assumed had been permanently deleted. Users must overwrite previous data to truly get rid of it, Avast says.
In blockbuster productions, Hollywood’s depiction of archaeologists stretches the truth more than a little. In reality, archaeologists are less like Indiana Jones or Lara Croft. Rather, they can be found living lives that are focused primarily on the academic impact of their findings. However, new technologies are pushing the boundaries of what can be discovered, bringing a new level of excitement to the field.
Using satellite imaging, with a variety of sensor types and resolutions, modern day archaeologists can now map ancient cities and estimate the best locations for new digs. By combining information gathered via satellite — high-resolution photos in the visible and near infrared spectrum—with data analysis and manual surveys, archaeologists can more easily and safely uncover those lost civilizations.
Who says coding has to be boring? Checkio, a Las Vegas company funded by Zappos founder Tony Hsieh, has come up with a way to turn writing code and helping others write code into a game.
The company’s latest addition to its web-based code-editing platform is a publish-and-share feature, where players can write, design, and publish custom coding missions and then share them across the Checkio community. Those who win the top scores in the leaderboards, which measure the “most elegant” solutions, can win prizes.
Android: Your phone communicates with a lot of people when you’re not looking. If you’d like to watch the watchers, viaProtect monitors your connections and provides a report of who your phone is communicating with and how secure that connection is.
The app monitors real-time traffic, so you’ll need to leave viaProtect on in the background to get some amount of data to analyse first. The app can provide you with a list of organisations your phone is speaking to (unsurprisingly, Google tends to top the list), what countries that data’s going to, and how much of your traffic is encrypted along the way.
House numbers on Google Street View can turn up as blobby, blurry things, so its engineers built a pretty crazy neural network to decipher them. Except this algorithm also turns out to be very very good at deciphering other blobby, blurry texts — like CAPTCHAs, which it cracks with 99 per cent accuracy. Take that, human.
You have a smartphone, tablet and probably now, these days, a Fitbit or a smartwatch. Maybe you are an an early adopter or sports addict and have a sports shirt with sensors in it. All of these things, plus cameras, navigational devices, are full of sensors. All kinds of sensors and lots of sensors – somewhere between 15-20 sensors on each smartphone today.
There are sensors to detect GPS/location, the orientation of the mobile device (gyroscope), barometric sensors to assess the GPS to find altitude then there are sensors for humidity, pressure and proximity sensors, ambient light sensors, UV light sensors and motion /gesture sensors.