Share on Social Media:

States May Ban Online Censorship

Until now, the Masters of the Universe have seemed invulnerable. Facebook, Twitter, Google, and Amazon have grown accustomed to getting their way without effective opposition. Competitors can’t challenge their market domination, and the Biden-Harris junta evidently doesn’t want to rein them in. Unless the states intervene, Big Tech owns us.

A 'Walker, Texas Ranger' reboot is happening — here's what we know

Some states, though, have decided to enter the fray. Many have accused major tech platforms of online censorship. Florida and Montana led the way, considering laws forbidding censorship in social media, browser search engines, and online shopping fora.

Add Texas to the list. Texas Senator Bryan Hughes (R-Mineola) sponsored a bill that could penalize Amazon, Facebook, Google, or Amazon for blocking access to information or commentary.

The bill would authorize Texans banned or suspended by Twitter, Facebook, or YouTube to sue them.

Hughes said, “We don’t allow a cable company to cut off your television because it doesn’t like your religion.”

What do the states say this is about?

Governor Greg Abbott backed the Hughes bill. “Big Tech’s effort to censor conservative viewpoints is un-American”, Abbott said, “and we’re not going to allow it in the Lone Star State.” Abbott accused several firms of leading “a dangerous movement to censor conservative voices and religious freedoms.”

To this, Abbott’s targets have a prepared response. Online firms have long claimed safe harbor under Section 230 of the 1996 Telecommunications Act. The section treats them as ‘common carriers’, not as publishers. They would, therefore, be immune from defamation or copyright infringement lawsuits for material posted on their platforms. The reasoning is that they don’t control what users post, any more than the phone carrier controls voice conversations.

Call 1-855-216-0185

Abbott and Hughes argue that certain firms have forfeited these exemptions. They’ve done so, Abbott says, by acting as publishers. Rejecting content for political, religious, or social reasons is the behavior of a publisher. And publishers don’t qualify for Section 230 protection.

Will the states prevail in court? Check this space for updates.

Get the most from your online experience. For the best deals in internet service, contact Satellite Country. Call today. We can help.

Call 1-855-216-0185

When would now be a good time to order TV or internet service? Call today.

Share on Social Media:

Facial Recognition Technology Will Change Your Life

Any celebrity can tell you that fame comes at a price. If millions of people know who you are and recognize your facial features, you can attract an awful lot of unwanted attention.

You may be thinking: “So? I’m not a celebrity, so this has nothing to do with me.”

Don’t be so sure about this. With recent advances in facial recognition tools, you too may suffer this aspect of fame. Yes, when you’re out of your house, complete strangers could recognize you and track your every move.

Much of this you bring on yourself. Consider, for example, your use of social media. You post what you eat, what TV shows you watch, where you meet your friends for drinks, and even what your pets are doing. All this personal information you post on platforms such as Facebook and Instagram means anyone who cares to look can easily find you with a browser search.

9/11 terrorists caught testing airport security months before attacks
Mohammed Atta (right) and Abdulaziz Alomari at a security checkpoint in Portland International Airport
September 10, 2001


As if this doesn’t leave you exposed enough, small, easily concealable cameras are nearly everywhere. Add a few minor tweaks to facial recognition technology which, when it becomes just a little cheaper and more readily available, will enable nearly anyone to follow nearly anyone else in real time.

Your privacy, then, could soon become extinct. Everything you do away from home- and when you do it- will be accessible to the world at large..

Related image
Tom Cruise as John Anderton in Minority Report sees a video ad that has been customized for him, and that calls him by name.

How did we get here?

Take a close look at the photo above. Here you see Mohammed Atta and Abdulaziz Alomari, two of the most import conspirators in the 9/11 terrorist attacks, passing through an airport security checkpoint. The next day, Atta and Alomari would hijack Flight 111 from Boston and fly it into the North Tower of the World Trade Center. They and their co-conspirators would murder 2,977 people.

To counter-terrorism professionals, this is one of the most disturbing of all 9/11-related images. It disturbs not for what it displays, but what it implies.

The photo demonstrates that law enforcement and intelligence professionals had the information to prevent the 9/11 atrocities. Atta and Alomari had been testing airport security systems for months, and were on federal watch lists. But airport cops couldn’t recognize and stop the pair, lacking the necessary facial recognition tools and image database.

Law enforcement and intelligence adopt FR

Following the 9/11 atrocity, the U.S government strove to make up for lost time. Security experts wanted advanced facial recognition tools- and fast. Electronics firms were happy to meet the new demand, and continually refined their cameras and algorithms to capture ever greater detail, nuance, and accuracy. Software engineers developed machine learning apps that could sift through gigantic image databases almost instantaneously, eliding over irrelevant photos.

Now the technology is nearly perfect. Chinese police recently used facial recognition tools to find a suspect in a dense crowd of 50,000 concert attendees. The PRC also uses the tools to catch jaywalkers and send them instant fine notifications.

Amazon, one of the leaders in the field, sells a real-time facial recognition system, called REKOGNITION, to police departments all over the U.S.

Commercial uses multiply

September 12, 2017 is another signature date in the history of facial recognition. On that date, Apple unveiled the iPhone X. Previous face-scanning phones could be spoofed easily with masks or video. The iPhone X could not. It was the first phone with a truly safe face-scanning security portal.

The success of the iPhone X has opened up other possible uses:

  • Automated tagging of individuals on Facebook and Instagram
  • Recognition of, and automatic adjustment of seat and steering wheel placement for, each authorized driver of a car driven by several people
  • Flagging of frequent hotel guests immediately on their entry into the lobby, so they can bypass the usual desk check-in, and their room doors will open automatically as they approach
  • Streamlining of airport security checks… Your face will be your boarding pass.
  • More convenient shopping… At an FR-enabled retail store, you simply walk in, pick up the goods you want to buy, and walk out. You never have to produce cash or swipe a card. The store automatically deducts the price of your purchases from your credit card.
  • Highly personalized advertising… As you pass a billboard, a kiosk, or a mall sign, it will display ads tailored to your known interests, and may even call you by name.

Don’t call any of this far-fetched. Some of these applications have been implemented already. Others are on the way, and will reach consumer markets shortly.

Can facial recognition threaten your privacy or safety?

FR Technology brings many benefits, but there may be a few drawbacks in it. It could become a serious threat to your privacy, or even your career or your safety.

In a future post, we will explore the dangers of FR technology in detail.

For the best deals in internet service, contact Satellite Country. We can help.

Share on Social Media:

World Wide Web Inventor Calls for Its Overhaul

Tim Berners-Lee, the inventor of the world wide web, is unhappy with it.  He has been saying for years that it has evolved into something far different from what he envisioned. Not much more than ten years ago, the web was a decentralized open platform, but since then a few corporate giants have come to dominate it. Google, Facebook, Netflix, and Amazon hold a near-stranglehold over online information and commerce, and web surfers have to surrender privacy to get much use out of the web.

Image result for world wide web images

So what can we do to correct this sorry state of affairs? Well, Berners-Lee is hard at work on an alternative. Next week, he will launch a for-profit business called  Inrupt. Based on a crowd-sourced platform called Solid, it is meant to enable developers all over the world to wrest control of the web away from governments and corporate giants.

“It’s a historical moment.”

If Berners-Lee and his crew are successful, Google, Facebook, and Amazon will soon be struggling for survival. Berners-Lee is open about hisdesire not only to challenge them, but to take them down.. He jokingly (?) says his goal is ‘world domination’, and he says he wants a completely new internet. He said he is not consulting with Google or Facebook about how he will upend their business models. In his words: “We’re not asking their permission.”

“We have to do it now”, he said of Inrupt. “It’s a historical moment.”

Why now?

The need for a disruptive internet model has never been more obvious. For the last five years, one scandal after another has reminded us that our personal data is subject to manipulation and theft.

You’ve no doubt heard the news about Cambridge Analytica and the Obama reelection campaign hijacking Facebook user data to aid their political campaigns. Twitter and YouTube have been caught blocking, shadow-banning, or demonetizing conservative content. Google vacuums up personal data for ads, and apparently adjusts search functions for political reasons. In a recently released video of a Google corporate conference, several executives spoke of “our values”, with some pledging to use the platform to promote them. All of ‘our values’ were blatantly political.

We obviously- and urgently- need drastic overhaul of the world wide web. Otherwise, we will soon lose all semblance of honest and objective online information service.

Who’s in control?

Berners-Lee and Inrupt propose to address the failings of the dominant internet systems with a platform called Solid. With it, the user can create his own ‘personal online data store’ or POD. It will feature his calendar, music library, video library, contact list, to-do list, chat, and research tools. It’s like combining Outlook, WhatsApp, Slack, Spotify, and Google on the same browser- all available at the same time.

Most importantly, the data is under the user’s control. All the data he produces will be protected within his POD. The information will be secure, out of reach for his ISP, Google, Facebook, or any advertising engine- unless the user wants to release it. He can customize the degree of access he wants to provide for each bit of data.

This is a huge departure from the current internet model. In the last few years,  Google, Facebook, and other firms have been holding and controlling most online data in ‘silos’ that they built.

In the Solid web model, there are no silos.

What happens next?

Beginning almost immediately, developers can start building their own apps for the Inrupt platform. And Berners-Lee will spend the autumn tutoring developers and executives in building apps for Solid and Inrupt.

Tim Berners-Lee has set a daunting goal for himself. Can he really replace the current world wide web with something far better? Don’t bet against it. He has a record of bringing into fruition projects that others thought impossible.

(For the best internet connection, shop with Satellite Country. Talk to us. We can help.)

Share on Social Media:

20,000 Devices Support Amazon’s Alexa

Amazon’s famous artificial intelligence (A I) platform has become a force in the consumer market. At last week’s IFA consumer electronics conference in Berlin, Amazon announced that its Alexa app now works with more than 20,000 devices. This is an impressive advance, given that the firm said only last January that Alexa worked with 4,000 devices. A fivefold increase in eight months is almost unheard of for any product.

Image result for alexa images

Daniel Rausch, an Amazon executive, said, “Alexa has sung Happy Birthday millions of times to customers, and she’s told over 100 million jokes.”

20,000 Devices = Fivefold Increase in Eight Months

Rausch confirmed that Alexa works with more than 20,000 devices made by 3,500 manufacturers.

Amazon manufactures its own Alexa devices, including the Echo smart speakers,  Fire TV. and Fire tablets. But the company has been trying trying to get the app into as multiple third-party devices.

What is Alexa?

Alexa is an artificial intelligence, or machine learning, app. It works in phones, speakers, TV sets, thermostats, and even cars. At this year’s IFA conference, Netgear and Huawei announced that the app would be in their home routers. Amazon said it wants to bring the app into hotels and offices.

Alexa now has more than 50,000 skills. Hundreds of thousands of developers in 180 countries work with it. Many more are coming.

Rausch is especially proud of Alexa’s voice control functions. “It turned out that your smart phone is actually a pretty terrible remote control for your house,” he said. “You don’t want to fish around in your pocket, open applications, unlock your phone to control the device right in front of you. Voice has truly unlocked the smart home. That’s because its actually simpler.”

“You won’t need a manual”, Rausch said, “becasue our devices learn about you, not the other way around.”

What are Amazon’s competitors doing?

Alexa is not alone in its market. It competes with Apple’s Siri, Google’s Home Assistant, and Microsoft’s Cortana. Alexa is by far the most successful, though. Other providers are scrambling to replicate its market penetration, and likely will take years to catch up. Still, they are moving energetically to get their apps into laptops, phones, appliances- even vehicles.

Amazon seems unworried about its competitors. Its Echo smart speaker leads the voice assistant market by a wide margin. And Rausch says his company “has barely scratched the surface” of what voice control can do.

Getting into 20,000 devices in four years is an impressive feat. But for Amazon, evidently, it’s just the beginning.

(For the most reliable internet connection, shop with Satellite Country. Talk to us. We can help.)

Share on Social Media:

WORLD’S FIRST UNMANNED CONVENIENCE STORES

Are you fed up with surly or slow convenience store clerks? Do you want to buy something you’re slightly ashamed of, and would prefer not to face a human clerk? Wheelys offers a solution.

A Swedish firm best known for selling bicycle-mounted coffee bars, creperies, ice cream dispensers, and juice bars, Wheelys has opened an unmanned convenience store in Shanghai, China. The prototype store will be open around the clock, seven days a week. Because it requires no staff, the Wheelys concept will make it easier for entrepreneurs with limited capital to enter the grocery business.

Wheelys tested the concept successfully in a small town in rural Sweden. The Shanghai store marks its first test in a dense urban setting.

For access to the Wheelys store, the customer installs an app on his iOS or Android tablet or phone. The door opens automatically for anyone carrying a device with a registered app. The customer scans the bar codes for any goods he wants to buy, and Wheelys charges them to his credit card.

To prevent theft, a camera monitors the store. And since customers log themselves in through their apps upon entry, they can be identified easily if they take any goods without scanning them.

Wheelys says that if the Shanghai test is successful, it will license the unmanned store technology so retailers can incorporate it into their existing stores. A company spokesman said, “What Uber did for taxis, we do for retail.”

The Wheelys system is not as advanced as the unmanned store concept currently under development by Amazon– though Amazon has yet to test its system in an actual market setting. Amazon said that its stores will not require scanning of individual products. After logging in, the customer with simply load his cart with the goods he wants, and a scanner will total his purchases as he leaves.

Amazon has not said it plans to license its unmanned store technology.

(For the best internet connection, talk to us.  We can help.)

Share on Social Media:

CONNECTED DEVICES & PRIVACY

Image result for cat dog conspiracy

Can you keep a secret? No, you can’t, at least not for long. With ever more of your electronic devices, appliances, utility meters, fitness trackers, and home security systems connected to the internet, it’s nearly certain that at least one of them will rat on you sooner or later.

Could Your Devices Be Subpoenaed?

Allison Berman, writing for Singularity Hub, warned that the connected devices in your home could be subpoenaed as witnesses against you. She cited a 2015 murder case, for which police asked Amazon to turn over cloud-based data sent by an Alexa-enabled Echo device in the home of James Andrew Bates, in whose hot tub detectives had found the body of his colleague, Victor Collins. On the night of the murder, the device had been used for streaming music. The Echo device, equipped with seven mikes, listens constantly for the ‘wake word’ that will activate it, making it receptive to commands. Just before and after sensing the wake word, Echo begins recording sound and transmitting it to Amazon’s cloud.

Police believe the Echo device may have recorded audio germane to their investigation.

In the near future, police may solve crimes by interrogating refrigerators, thermostats, TV sets, stereos, phones, tablets, and security systems. With multiple electronic witnesses, they can obtain fairly accurate and comprehensive pictures of the crimes, as they seek to do by interviewing multiple witnesses to an auto accident.

Privacy laws regarding connected devices are very weak. Because the information is stored in the cloud, the owner or user of the devices doesn’t own the data they transmit. It’s not protected to the same degree that documents in his house are.

Could Your Connected Devices Be Hacked?

Of course, any connected device can be hacked. If Alexa is hacked, could a hostile party listen to everything you say in your home? And if you have twenty connected devices in your home, a hacker might obtain eerily accurate and complete information about what you do all day. Could he use it to blackmail you? What could a stalker do if he knows where you’ll be, when, and for what reason?

Hackers could also hijack your devices to spread false information about you. Patrick Frey, who blogs as ‘Patterico’, suffered a ’SWATting’ attack in 2011 after a hacker ‘spoofed’ his cellphone number to place a midnight 911 call. Pretending to be Frey, the caller said he had shot his wife.

Sheriff’s deputies pounded on Frey’s door and rang his doorbell. When he opened the door, they pointed their guns at him and told him to put his hands up. The deputies handcuffed Frey and placed him in a squad car. Then they awakened his wife, led her downstairs, and frisked her. After ascertaining that the children were safe, the police finally left.

The incident could easily have cost Frey his life. Cops are likely to be nervous in confronting a man they believe to be armed and to have just committed a murder.

Can You Trust Browsers and Social Media?

Loss of privacy need not require either hacking or law enforcement inquiry. Certain browsers, such as Google, and social media, such as Facebook, offer overly complicated terms of service– as long as 30,000 words. Few, if any, users read them. The rules are nearly inscrutable for a reason. They’re meant to protect providers from liability, not to protect your privacy.

Since you don’t pay for Google and Facebook services, you are their product. They earn their money through sale of advertising, so they want as much data about you as possible. Their advertisers demand it.

Two years ago, Facebook faced a media firestorm after the discovery that it had been manipulating the emotional states of thousands of users. Facebook had learned that the emotional impact of the images it showed users would affect the character of their posts. With this information, it could reinforce advertising messages.

You reveal far more through social media than you’d guess. MIT’s ‘Gaydar’ project confirmed that one could reliably infer that a particular subject was gay, based solely on his social media posts, even if he had never admitted it openly, and even if he was trying strenuously to keep it hidden. Another MIT project, called ‘Psychopath’, tracked social media posts to determine presence or absence of schizophrenia.

Can You Trust Your Smart TV Set?

On Monday, February 6, Vizio settled a lawsuit over claims that it had violated consumer privacy. The plaintiffs had alleged that Vizio’s connected ‘smart’ TV sets had been tracking ‘second by second’ data about customer viewing habits. To this, Vizio had allegedly added specific demographic information: age, sex, marital status, size of household, income, home ownership, and household value. The company is alleged to have sold this information to third parties. The third parties would use it to enable targeted advertising.

LG and Samsung have also been accused of collecting viewer data through their connected TV sets.

What Can You Do?

What can you do to protect yourself? Update your passwords often. Encrypt what you can. Always stay aware of when your connected devices are switched on.

It may help to assume that everything you do will become public- and live accordingly.

(For the most reliable connection, talk to us. We can help.)