Would you be willing? Me neither.
How many dollars do you need to stop using your cell phone for 365 days, without accessing anything? For me, I think there would not be enough dollars.
But that’s what Vitamin Water (from Coca-Cola Company) wants to find out, which will select a “lucky” one, who must spend a year with a flip phone that only receives and makes calls. Note: not text messages either.
— vitaminwater® (@vitaminwater) December 11, 2018
The challenge #NoPhoneForAYear already has several trying to be selected for it. Some claim that it is very little money, others say it would be very easy, but what would it be like for you? Note that this also means not using a tablet. Maybe you can “get the urge” to check your social media with a computer, but not much more.
Do you want to try to be selected? You have to upload a photo with the corresponding hashtags that will surprise the VitaminWater team enough to really think you need a break from your mobile.
You have until January 8.
Hey Facebook, are you listening? Woman claims she has PROOF her phone is spying on conversations
It is not the first time that this topic is put on the table. Many people in fact, are sure that Facebook listens to the conversations they have live with their friends or relatives, all in order to direct publicity towards them.
And it is that for coincidence, it is too much. The reality is clear: to many it has happened that we chatted with someone about such product or place (without doing Google searches or anything similar, all in person), and when you open Facebook you start to see advertising that has everything to do with the talk that you just had Scary.
Adelaide Bracey is originally from Australia. She was chatting with a friend of his in person about going some day to relax in a sauna. Then he opened his profile and of course he did: advertising about saunas in his area. So random everything. What are the possibilities?
I did not search it on Google, and then it appears as an ad on my Facebook. It’s really creepy, the girl commented to The Australian.
Facebook itself has repeatedly denied it uses microphone recordings to target ads.
“Facebook does not use your phone’s microphone to inform ads or to change what you see in News Feed,” a company spokesperson said.
“Some recent articles have suggested that we must be listening to people’s conversations in order to show them relevant ads. This is not true.
“We show ads based on people’s interests and other profile information – not what you’re talking out loud about.
“We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio.
“This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.”
Do you think your phone is spying on you? To believe them or not to believe them?
Goodbye Uncanny Valley: NVIDIA creates an AI that designs exact faces to the real ones
Tonight’s nightmare will be courtesy of the guys from NVIDIA. Our readers do not need an explanation of what the Uncanny Valley consists of. So when you watch this video you will realize that it will soon be a thing of the past. And obviously it had to start with the software.
It turns out that the company has just published the results of its most recent research project. Under the title of A Style-Based Generator Architecture for Generative Adversarial Networks (GAN).
Where, in collaboration with specialist engineers have created the maximum GAN. Able to assemble a generator of fake faces based on blends of styles.
Where the Artificial Intelligence neural network takes different facial features of other people to combine them and create photo-realistic faces:
Each and every one of the images that we see up there do not exist. They were generated by the Artificial Intelligence of NVIDIA.
At first glance, anyone could think that it is a photograph of a real person. And that frankly is disturbing.
In the end, this project may represent the first seed for a new era in the robotics and artificial intelligence industry.
Do not miss the video where it explains in detail how this AI works.
Top three theories
First, the uncanny valley might occur at the boundary where something moves from one category to another, in this case, between non-human and human. Christine Looser and Thalia Wheatley looked at mannequin faces that were morphed into human faces and found a valley at the point where the inanimate face started to look alive.
Second, the presence of a valley may hinge on whether we’re able to believe that near-human entities possess a mind like we do. A study by Kurt Gray and Daniel Wegner found that robots were only unnerving when people thought that they had the ability to sense and experience things, and robots that did not seem to posses a mind were not frightening.
A final compelling area for future research is that the uncanny valley occurs because of mismatches between aspects of the robot’s appearance and/or behaviour. Angela Tinwell’s work has looked at many types of mismatch, including speech synchronisation, speech speed and facial expressions. In one 2013 study, near-human agents that reacted to a startling noise by showing surprise in the lower part of their face (not the upper part) were found to be particularly eerie. This study suggested that this may be even be reminiscent of the pattern of expressive behavior exhibited by humans with psychopathic traits.
A hacker spoke to him through the security camera of his house to alert him of the risk he was being exposed to
Technology, you ought to love it. But at what cost? Experts have long warned that internet-connected devices in your home, including security and monitoring systems, could be vulnerable to hacks.
Andy Gregg, an Arizona resident, was in his backyard one night when he heard a voice he did not recognize. He quickly thought that someone had been able to enter his house, but that had not been the case.
The place where the voice came from surprised him: someone was talking to him from his Nest Cam IQ security device in the front window. A hacker, who had identified himself as a good person, had managed to enter the system and reach Gregg.
“I’m sorry if I startled you or something. I realize that this is very unprofessional, and I regret that it’s a bit late to do it, “said the hacker who claimed to be a worker in the Anonymous Calgary group in Canada.
The hacker could not see images from his camera or know exactly where he lived, but he assured him that it would not be a difficult job for someone to find out.
“We are white hackers and I am here to inform you about the risks you run if a black hacker manages to enter your platform,” he said.
In the video of the moment, which has circulated on social networks and lasts about two minutes, you can see how the hacker tells Gregg that he knows his passwords, but that he has no bad intentions.
“You basically feel vulnerable. It feels as if you have been robbed and there is someone in your house. They know when you are there. They know when you leave, “said Gregg, who has already changed his passwords and disconnected the camera.
Gregg’s case has happened on multiple occasions and in various parts of the world. It is enough to have a device with Internet to become a target of cybernetic pirates, and not precisely of those who arrive to warn about these dangers.
Recently, a mother in New York reported that a stranger had spoken with her daughter of only five years through the inner chamber of her house and had asked her personal questions about her routine. Now she lives with the fear that someone may enter her private space.
On this occasion, the camera in question was also a Nest, device that belongs to the parent company of Google, Alphabet. The company said in a statement that it recommends its customers to use two-factor authentication for greater peace of mind.
But beyond the security advice of companies and the experts themselves, there are those who say it is vital to read each instruction on these devices to know how to keep them up to date with the latest updates.
“We buy things, they’re great or they make our lives easier, and we do not think about the security implications. For a consumer to be able to protect their devices, they basically have to be a security expert, “said Francisco Saravia, an independent Penetration Testing freelancer– aka pen testing — is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit.
But how can we be more careful if our lives are already dependent on devices such as Alexa, Google Home, Amazon Cloud Cam and mobile phones, which have also become popular among any type of consumer?
The answer, according to several experts, is to be on the lookout and understand the real risks that exist when this type of technology is brought to our homes.
U.S.3 weeks ago
Because of Illinois case, U.S. Supreme Court tosses verdict saying attorneys can’t be forced to support political speech
Live2 weeks ago
LIVE | Springfield City Council Meeting January 3rd, 2019
Live2 weeks ago
LIVE | Springfield City Council Committee of the Whole January 8th
Live2 weeks ago
LIVE | Chatham Village Board meeting January 8th
Live1 week ago
LIVE | First Springfield Budget Workshop for FY20
Live4 days ago
LIVE | Police and Fire budget workshop presentations
Live4 days ago
LIVE | Springfield City Council Meeting January 15