Archives 8 January 2020

Xiaomi Camera Feed is Showing Random Homes on a Google Nest Hub, Including Still Images of Sleeping People

So-called “smart” security cameras have had some pretty dumb security problems recently, but a recent report regarding a Xiaomi Mijia camera linked to a Google Home is especially disturbing. One Xiaomi Mijia camera owner is getting still images from other random peoples’ homes when trying to stream content from his camera to a Google Nest Hub. The images include sills of people sleeping (even an infant in a cradle) inside their own homes. This issue was first reported by user /r/Dio-V on Reddit and affects his Xiaomi Mijia 1080p Smart IP Security Camera, which can be linked to a Google account for use with Google/Nest devices through Xiaomi’s Mi Home app/service. It isn’t clear when Dio-V’s feed first began showing these still images into random homes or how long the camera was connected to his account before this started happening. He does state that both the Nest Hub and the camera were purchased new. The camera was noted as running firmware version 3.5.1_00.66.

AI is Sending People To Jail–and Getting it Wrong

The US imprisons more people than any other country in the world. At the end of 2016, nearly 2.2 million adults were being held in prisons or jails, and an additional 4.5 million were in other correctional facilities. Put another way, 1 in 38 adult Americans was under some form of correctional supervision. The nightmarishness of this situation is one of the few issues that unite politicians on both sides of the aisle.

Under immense pressure to reduce prison numbers without risking a rise in crime, courtrooms across the US have turned to automated tools in attempts to shuffle defendants through the legal system as efficiently and safely as possible. This is where the AI part of our story begins. Police departments use predictive algorithms to strategize about where to send their ranks. Law enforcement agencies use face recognition systems to help identify suspects. These practices have garnered well-deserved scrutiny for whether they in fact improve safety or simply perpetuate existing inequities.

Researchers and civil rights advocates, for example, have repeatedly demonstrated that face recognition systems can fail spectacularly, particularly for dark-skinned individuals — even mistaking members of Congress for convicted criminals. But the most controversial tool by far comes after police have made an arrest. Say hello to criminal risk assessment algorithms.

Samsung Chip Output at South Korea Plant Partly Halted Due To 1-Minute Electricity Glitch

A 1-minute power glitch on Tuesday, December 31, partially shut down Samsung chip production at its Hwaseong chip complex in South Korea for “two or three days”. DRAM and NAND lines were affected. Preliminary inspections show “no major damage” but losses are still expected to be in the millions.

Internet shutdowns used to be rare. They’re increasingly becoming the norm in much of the world

An ongoing internet blackout in Indian-controlled Kashmir is now the longest ever in a democracy — at more than 135 days — according to Access Now, an advocacy group that tracks internet freedom. Only the autocratic governments of China and junta-era Myanmar have cut off access for longer… Kashmiris have been without internet access for so long that WhatsApp has reportedly begun deleting their accounts for inaction… India’s increased internet censorship has been greeted with delight in China, however, where state-run media pointed to it as an endorsement of Beijing’s own authoritarian approach. The People’s Daily said this week that India’s example showed “shutting down the internet in a state of emergency should be standard practice for sovereign countries….”

African states have also embraced the tactic, with Zimbabwe, the Democratic Republic of Congo, Chad and Ethiopia all cutting off internet access in an attempt to rein in anti-government protests. This is in line with a general pattern of increased online censorship. It’s partly due to the spread of more sophisticated technology that makes it easier, and cheaper, to monitor and filter traffic online. It’s also influenced by a shifting perception of internet censorship, which once used to be seen as something of a losing battle. China’s Great Firewall, however, has proved beyond doubt that not only can the internet be controlled, but that doing so can help prop up the regime and prevent opposition movements from getting off the ground…

Shutdowns give police a freer hand to reign in unrest without the type of hyper-scrutiny on social media that has become common in highly-connected societies, and enable the government to ensure that its message is the only one heard on a particular topic. In 2018, there were 196 internet shutdowns globally — mainly in Asia, Africa and the Middle East — according to Access Now. In the first half of this year alone, there were 128, and 2019 looks to be the worst year on record. According to Freedom House, a Washington-based NGO, almost half of the world’s population lives in a country “where authorities disconnected internet or mobile networks, often for political reasons.”

Amazon is looking into tech that can identify you using the veins in your hand

Amazon filed a patent for technology that could identify you by scanning the wrinkles in the palm of your hand and by using a light to see beneath your skin to your blood vessels. The resulting images could be used to identify you as a shopper at Amazon Go stores. It was previously reported that the Seattle-based tech giant might install these hi-tech scanners in Whole Foods grocery stores. However, the U.S. Patent and Trademark Office published an application on Thursday that suggests the e-commerce behemoth sets its sites on Amazon Go stores…

While fingerprint scanners have been around for years, Amazon hopes to innovate by developing a personal identification system that you don’t have to touch. Imagine hovering your hand in front of an infrared light as a camera snaps two images — one from the surface, and one that looks for “deeper characteristics such as veins.” An internal computer system would then identify you based on that information.