As AI influencers storm social media, some fear a ‘digital Pandora’s box’ has been opened – ABC News

xxx

Soon after creating Margot, Madison and Laura found themselves receiving pushy messages from men trying to pursue relationships with Margot despite the profile clearly stating she was not real.

From: As AI influencers storm social media, some fear a ‘digital Pandora’s box’ has been opened – ABC News.

xxx

As AI influencers storm social media, some fear a ‘digital Pandora’s box’ has been opened – ABC News

xxx

The inspiration was Aitana Lopez, a bright-haired, 25-year-old model and content creator with 325,000 followers on Instagram.

But Aitana, whose profile describes her as a “gamer at heart” and “fitness lover” living in Barcelona, is entirely generated by AI.

From: As AI influencers storm social media, some fear a ‘digital Pandora’s box’ has been opened – ABC News.

xxx

Inside a Violent Gang’s Ruthless Crypto-Stealing Home Invasion Spree | WIRED

I have thought for some time that the crime is undereported. There are credible reports of thefts and attempted thefts of cryptocurrency via physical attacks that are not reported (because the victims do not want to share their details and, presumably, attract further attacks). In-person digital larceny may well be on the rise as thieves realize the attraction of crypto as a transportable theft target.

Inside a Violent Gang’s Ruthless Crypto-Stealing Home Invasion Spree | WIRED

xxx

That announcement and the criminal complaint laying out charges against St. Felix focused largely on a single theft of cryptocurrency from an elderly North Carolina couple, whose home St. Felix and one of his accomplices broke into before physically assaulting the two victims—both in their seventies—and forcing them to transfer more than $150,000 in Bitcoin and Ether to the thieves’ crypto wallets.

From: Inside a Violent Gang’s Ruthless Crypto-Stealing Home Invasion Spree | WIRED.

xxx

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards | WIRED

xxx

Now a team of security researchers is about to reveal how one of HID’s crucial protections against that cloning technique—secret cryptographic keys stored inside its encoders—has been defeated, significantly lowering the barrier to copying credentials that let intruders impersonate staff and unlock secure areas worldwide.

From: How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards | WIRED.

xxx

States Need Stronger Identity Verification as Online Services Grow

xxx

More than half of agencies responding to the survey use KBA — where users answer personal questions like, “What was the name of your best friend in high school?” to prove their identity — making it the most common verification method. The National Institute of Standards and Technology (NIST) recommends against using KBA because fraudsters have gotten too adept at answering KBA questions.

From: States Need Stronger Identity Verification as Online Services Grow.

xxx

eIDAS2 is a €Bn opportunity staring us in the face – but most people can’t see it

xxx

But with a digital wallet, companies can give the data back to the individual. Where the customer becomes the courier of the data. Moving their personal information more seamlessly, more securely and more privately than the business can on its own.

From: eIDAS2 is a €Bn opportunity staring us in the face – but most people can’t see it.

xxx

States Need Stronger Identity Verification as Online Services Grow

xxx

More than half of agencies responding to the survey use KBA — where users answer personal questions like, “What was the name of your best friend in high school?” to prove their identity — making it the most common verification method. The National Institute of Standards and Technology (NIST) recommends against using KBA because fraudsters have gotten too adept at answering KBA questions.

From: States Need Stronger Identity Verification as Online Services Grow.

xxx

PUF-Based Digital Money with Propagation-of-Provenance and Offline Transfers Between Two Parties | ACM Journal on Emerging Technologies in Computing Systems

xxx

Building on prior concepts of electronic money (eCash), we introduce a digital currency where a physical unclonable function (PUF) engenders devices with the twin properties of being verifiably enrolled as a member of a legitimate set of eCash devices and of possessing a hardware-based root-of-trust. A hardware-obfuscated secure enclave (HOSE) is proposed as a means of enabling a PUF-based propagation-of-provenance (POP) mechanism, which allows eCash tokens (eCt) to be securely signed and validated by recipients without incurring any third party dependencies at transfer time. The POP scheme establishes a chain of custody starting with token creation, extending through multiple bilateral in-field transactions, and culminating in redemption at the token-issuing authority. A lightweight mutual-zero-trust (MZT) authentication protocol establishes a secure channel between any two fielded devices. The POP and MZT protocols, in combination with the HOSE, enables transitivity and anonymity of eCt transfers between online and offline devices.

From: PUF-Based Digital Money with Propagation-of-Provenance and Offline Transfers Between Two Parties | ACM Journal on Emerging Technologies in Computing Systems.

xxx

Design a site like this with WordPress.com
Get started