Diberdayakan oleh Blogger.

Popular Posts Today

Chatroom 'rape' woman sent to jail

Written By Unknown on Sabtu, 09 Agustus 2014 | 23.52

8 August 2014 Last updated at 19:14

A woman who used internet chatrooms to try to arrange for strangers to rape a former work colleague has been jailed for six years.

Joanne Berry, 30, from Grove Park, south-east London, said she liked role-play and invited men to act out violent "rape scenarios" with her.

But instead of giving her own address she gave that of the work colleague in Kent.

A judge said Berry may have held the victim responsible for losing her job.

One man tried to barge into the victim's home, but aborted the plan when he realised they had both been set up.

'Irrational vendetta'

Berry was convicted at an earlier hearing at Maidstone Crown Court of putting a person in fear of violence, assault with the intention of committing a sexual offence, common assault and attempting to cause a person to engage in sexual activity without consent.

Continue reading the main story

That (the victim) was not in fact raped or seriously sexually assaulted is entirely fortuitous"

End Quote Judge David Griffith-Jones QC

Judge David Griffith-Jones QC said Berry had developed an "irrational vendetta" against the victim who had only shown kindness towards her.

She found a chatline through which she made contact with a man known in court as "DH", who gave evidence during the trial.

Eventually Berry persuaded DH to come to "her home", knock on the door and "rape" her, but she gave him the victim's address.

The judge said her behaviour was wicked and calculating.

"That (the victim) was not in fact raped or seriously sexually assaulted is entirely fortuitous," he said.

Part of a victim impact statement was read out at court. The woman described how the ordeal had left her suffering panic attacks.

She now refuses to sit out in the garden on her own because she fears men may force their way in and she panics when someone knocks on her door.


23.52 | 0 komentar | Read More

All USB devices 'critically flawed'

8 August 2014 Last updated at 10:03 By Dave Lee Technology reporter, BBC News
Karsten Nohl and Dave Lee

Please turn on JavaScript. Media requires JavaScript to play.

Karsten Nohl shows Dave Lee a threat on a USB-connected smartphone

Cyber-security experts have dramatically called into question the safety and security of using USB to connect devices to computers.

Berlin-based researchers Karsten Nohl and Jakob Lell demonstrated how any USB device could be used to infect a computer without the user's knowledge.

The duo said there is no practical way to defend against the vulnerability.

The body responsible for the USB standard said manufacturers could build in extra security.

But Mr Nohl and Mr Lell said the technology was "critically flawed".

It is not uncommon for USB sticks to be used as a way of getting viruses and other malicious code onto target computers.

Continue reading the main story

"Start Quote

You can never trust anything anymore after plugging in a USB stick"

End Quote Karsten Nohl Security Research Labs

Most famously, the Stuxnet attack on Iranian nuclear centrifuges was believed to have been caused by an infected USB stick.

However, this latest research demonstrated a new level of threat - where a USB device that appears completely empty can still contain malware, even when formatted.

The vulnerability can be used to hide attacks in any kind of USB-connected device - such as a smartphone.

"It may not be the end of the world today," Mr Nohl told journalists, "but it will affect us, a little bit, every day, for the next 10 years".

"Basically, you can never trust anything anymore after plugging in a USB stick."

'Chip' exploited

USB - which stands for Universal Serial Bus - has become the standard method of connecting devices to computers due to its small size, speed and ability to charge devices.

USB memory sticks quickly replaced floppy disks as a simple way to share large files between two computers.

The connector is popular due to the fact that it makes it easy to plug in and install a wide variety of devices. Devices that use USB contain a small chip that "tells" the computer exactly what it is, be it a phone, tablet or any other piece of hardware.

Karsten Nohl

Please turn on JavaScript. Media requires JavaScript to play.

Karsten Nohl: "You can never trust anything anymore after plugging in a USB stick"

It is this function that has been exposed by the threat.

Smartphone 'hijack'

In one demo, shown off at the Black Hat hackers conference in Las Vegas, a standard USB drive was inserted into a normal computer.

Continue reading the main story

"Start Quote

Any business should always have policies in place regarding USB devices and drivers"

End Quote Mike McLaughlin First Base Technologies

Malicious code implanted on the stick tricked the machine into thinking a keyboard had been plugged in.

After just a few moments, the "keyboard" began typing in commands - and instructed the computer to download a malicious program from the internet.

Another demo, shown in detail to the BBC, involved a Samsung smartphone.

When plugged in to charge, the phone would trick the computer into thinking it was in fact a network card. It meant when the user accessed the internet, their browsing was secretly hijacked.

Mr Nohl demonstrated to the BBC how they were able to create a fake copy of PayPal's website, and steal user log-in details as a result.

Unlike other similar attacks, where simply looking at the web address can give away a scam website, there were no visible clues that a user was under threat.

The same demo could have been carried out on any website, Mr Nohl stressed.

'Trust nothing'

Mike McLaughlin, a security researcher from First Base Technologies, said the threat should be taken seriously.

"USB is ubiquitous across all devices," he told the BBC.

"It comes down to the same old saying - don't plug things in that you don't trust.

"Any business should always have policies in place regarding USB devices and USB drives. Businesses should stop using them if needed."

Universal Serial Bus (USB)
  • Standard method of connecting devices to computers
  • Popular due to its small size
  • Easy to plug in and install a variety of devices

The group responsible for the USB standard, the USB Working Party, refused to comment on the seriousness of the flaw.

But in more general terms, it said: "The USB specifications support additional capabilities for security, but original equipment manufacturers (OEMs) decide whether or not to implement these capabilities in their products.

"Greater capabilities of any product likely results in higher prices, and consumers choose on a daily basis what they are willing to pay to receive certain benefits.

"If consumer demand for USB products with additional capabilities for security grows, we would expect OEMs to meet that demand."

Mr Nohl said the only protection he could advise was to simply be ultra-cautious when allowing USB devices to be connected to your machines.

"Our approach to using USB will have to change," he told the BBC.

Follow Dave Lee on Twitter @DaveLeeBBC


23.52 | 0 komentar | Read More

Million neurons on stamp-sized chip

8 August 2014 Last updated at 08:40 By Jonathan Webb Science reporter, BBC News

Scientists have produced a new computer chip that mimics the organisation of the brain, and squeezed in one million computational units called "neurons".

They describe it as a supercomputer the size of a postage stamp.

Each neuron on the chip connects to 256 others, and together they can pick out the key features in a visual scene in real time, using very little power.

The design is the result of a long-running collaboration, led by IBM, and is published in the journal Science.

"The cumulative total is over 200 person-years of work," said Dr Dharmendra Modha, the publication's senior author.

He told BBC News the processor was "a new machine for a new era". But it will take some time for the chip, dubbed TrueNorth, to be commercially useful.

Next generation

This is partly because programs need to be written from scratch to run on this type of chip, instead of on the traditional style which was conceived in the 1940s and still powers nearly all modern computers.

Continue reading the main story

"Start Quote

Google Images... does a marvellous job of recognising pictures of cats - but it is using large arrays of computers"

End Quote Sophie Wilson Senior Technical Director, Broadcom

That design, where the processors and memory are separate, is a natural match for sequential, mathematical operations.

However, the heavily interconnected structure of biologically-inspired, "neuromorphic" systems like TrueNorth is said to be a much more efficient way of handling a lot of data at the same time.

"Our chip integrates computation, communication and memory very closely," Dr Modha said.

Instead of binary ones and zeros, the units of computation here are spikes. When its inputs are active enough, one of TrueNorth's "neurons" generates a spike and sends it across the chip to other neurons, taking them closer to their own threshold.

Software has to be written completely differently for these spiking-network systems.

"It will be interesting to see those programs develop - but don't hold your breath," commented Sophie Wilson, an eminent computer engineer based in Cambridge.

Ms Wilson, a fellow of both the Royal Academy of Engineering and the Royal Society, can definitely see a role for this next generation of computing strategies.

"It's clear that conventional scalar processing is getting very tricky for some of these tasks," she told the BBC. "Google Images, for example, does a marvellous job of recognising pictures of cats - but it is using large arrays of computers to do that."

Grid after grid

The building blocks for the TrueNorth chip are "neurosynaptic cores" of 256 neurons each, which IBM launched in 2011.

Dr Modha and his team managed to engineer an interconnected 64-by-64 grid of these cores on to a single chip, delivering over one million neurons in total.

Because each neuron is connected to 256 others, there are more than 256 million connections or "synapses".

This complexity is impressive for a man-made device just 3cm across, but still pales in comparison with the organ it emulates. Biological neurons, packed inside the brain, send and receive something in the order of 10,000 connections each.

The chip, Dr Modha is quick to point out, is "endlessly scalable". Multiple units can be plugged together to form another, still more powerful assembly.

"This isn't a 10-15% improvement," he said. "You're talking about orders and orders of magnitude."

To demonstrate TrueNorth's capabilities, Dr Modha's team programmed it to do a visual perception party trick.

Within a video filmed from a tower at Stanford University, a single chip analysed the moving images in real time and successfully identified which patches of pixels represented pedestrians, cyclists, cars, buses and trucks.

This is just the sort of task that the brain excels at, while traditional computers struggle.

Continue reading the main story

"Start Quote

This is another step in a programme, whose end point I suspect even they don't know at the moment"

End Quote Prof Steve Furber University of Manchester
Expanding horizons

Dr Modha envisages myriad next-generation applications, from glasses that help visually impaired people navigate, to robots for scouring the scene of a disaster.

But some of the gains might be overstated - or perhaps too eagerly anticipated.

Prof Steve Furber is a computer engineer at the University of Manchester who works on a similarly ambitious brain simulation project called SpiNNaker. That initiative uses a more flexible strategy, where the connections between neurons are not hard-wired.

He told BBC News that "time will tell" which strategy succeeds in different applications.

The new IBM chip was most significant, Prof Furber said, because of its sheer degree of interconnectedness. "I see it as continuing their programme of research - but it's an interesting and aggressive piece of integration," he said.

"This is another step in a programme, whose end point I suspect even they don't know at the moment."

Ms Wilson also pointed out that TrueNorth's efficiency, while it might trump a vast supercomputer, is not very far ahead of the latest small devices like smartphones and cameras, which are already engineered to minimise battery usage.

"Cellphone cameras can recognise faces," she said.

There is also a rival chip made by a company called Movidius, which Ms Wilson explained is not as adaptable (it is designed very specifically to process images) but uses even less power than TrueNorth.

That product, which we might see in devices as soon as next year, has also lifted elements of its computing strategy from the human brain.

Follow Jonathan on Twitter


23.52 | 0 komentar | Read More

Pokemon-playing fish makes a splash

8 August 2014 Last updated at 10:48 By Zoe Kleinman Technology reporter, BBC News

A live feed of a fish called Grayson playing vintage Nintendo game Pokemon from his tank in a US college dorm room has had more than one million views.

Grayson's movements dictate the actions of his on-screen Pokemon Red character. The Betta fish has been playing for more than 135 hours.

The project was created as part of a hackathon by two students,

Some viewers have expressed concern about Grayson's welfare on the messageboards of social site Reddit.

"Grayson's health and safety are our primary concern," wrote the creators of the feed, college students Catherine Moresco and Patrick Facheris in response.

They claim that the tank is heated and the water changed regularly - and they intend to get a bigger tank.

By 10:40 BST on Friday, 1,175, 673 people had viewed the real-time feed on Twitch, a website dedicated to live-streaming video gaming.

Pokemon Red/Blue was developed for the Nintendo Gameboy handheld console in the 1990s.

The aim of the game is to become champion of a fictional region known as Kanto by defeating eight Gym Leaders.

The developers said Grayson had already acquired his first Pokemon and defeated his first opponent.

The game was built in 24 hours during New York hackathon HackNY, according to its page on Twitch .

Another Twitch stream which invited multiple players to simultaneously control a single Pokemon character in one game ended in March.

The game was completed in 16 days and was watched by around 36 million people.


23.52 | 0 komentar | Read More

One million on 'superfast broadband'

8 August 2014 Last updated at 11:28

The UK's culture secretary has said that more than a million properties now have access to "superfast broadband speeds" as a result of a government-backed rollout of the tech.

Sajid Javid added that the effort was "firmly on track" to offer high-speed internet to 95% of UK homes and businesses by 2017.

He said that fast speeds were "totally transforming the way we live and work".

But many have questioned the quality of access and speeds advertised.

'Not good enough'

Superfast broadband is defined by the European Union as speeds of 24Mbps or above. The UK government's ambition is to provide 95% of the UK with those speeds or higher by 2017, with the rest having a minimum speed of 2Mbps.

Continue reading the main story

There are far too many homes and businesses in both rural and urban areas that won't see any benefit for some years to come"

End Quote Independent Network Co-operative Association

By contrast, Finland plans to have a baseline speed that is more than four times faster - 100Mbps - by next year, while South Korea wants to see citizens equipped with 1Gbps connections by 2017.

The Federation of Small Businesses (FSB) has said that the UK's broadband target is simply not ambitious enough when compared with other nations and wants the government to commit to delivering a minimum of 10Mbps for all homes and businesses by 2018-19.

John Allan, FSB's national chairman, told the BBC that "there is still a long way to go".

"Small businesses are increasingly reliant on digital services, but too many are without decent and affordable broadband that meets their needs. This restricts their ability to grow, innovate and compete in global markets.

"Leaving 5% of the UK without adequate broadband in 2017 is simply not good enough. "

But the UK government says the current UK coverage of superfast broadband is the highest of the five biggest European economies.

Rural access

The government has also set aside millions to improve broadband access in rural areas.

But BDUK, the group set up to spend the £530m of government money for the rural internet initiative, has come in for criticism for delays in distributing funds to councils and for awarding every contract to BT.

"Getting fibre to rural areas is hard, and often complex, work, but we are making great progress," said Gavin Patterson, the chief executive of BT, adding that it was laying undersea cables to the Outer Hebrides, for example.

"Some of the early projects are close to completion, and further funds will be released if we come in under-budget or take-up exceeds expectations," he said.

A Commons Public Accounts Committee report criticised the government for wasting taxpayers' money by giving all of its broadband funds to BT.

The FSB has said that coverage in rural areas is "either very poor or non-existent".

Alternative providers are already in place. B4RN (Broadband for the Rural North), for example, offers broadband speeds of up to 1Gbps to about 350 homes currently. But since BT signed contracts with councils around the UK, the plug has been pulled on several community-based schemes.

Malcolm Corbett, head of the Independent Network Co-operative Association, which represents some of the smaller broadband suppliers, told the BBC: "It is great that the rollout programme is making good progress. However, there are far too many homes and businesses in both rural and urban areas that won't see any benefit for some years to come.

"Fortunately there is a growing sector of independent providers that are stepping up to fill the void," he added, citing projects like CityFibre, which is developing a portfolio to bring ultra-high-speed broadband to York, Peterborough, Coventry, Bournemouth, and more.

Andrew Ferguson, the editor of thinkbroadband.com, told the BBC that the focus was now on those 5% of people in the "most remote and hardest parts" of the UK not covered by the current plans for superfast broadband.

He said that £10m had been invested in a series of pilot projects currently under way in eight locations across the nation to work out how best to get broadband to them.

"The findings will be used to inform future funding bids to ensure everyone benefits from the transformation of the digital landscape currently under way," he added.


23.52 | 0 komentar | Read More

Microsoft to end old Explorer fixes

8 August 2014 Last updated at 11:34

Anyone using older versions of Microsoft's Internet Explorer browser will soon no longer get security updates and bug fixes for the software.

From 12 January 2016 Microsoft will only support the latest copy of IE for the different versions of Windows.

The shift ends a long-standing policy of providing support for different versions of IE for many years.

Microsoft said the move would aid security and help developers, who would only need to support newer browsers.

In a blogpost explaining the changes, Microsoft said commercial customers who had "standardised" on earlier versions of IE should start preparing plans now to migrate to more up-to-date releases.

In addition, Microsoft said it would provide resources and help for customers to ensure web-based applications and programs created for older versions of IE continue to work with newer versions.

The change should help developers, said Microsoft, because they will no longer be required to support the out-of-date technologies in those older browsers.

'Targeted by cyber-thieves'

Up to now, Microsoft's support for the versions of IE lasted as long as its support system for the version of Windows that the browser initially shipped with. In some cases, this meant it had to keep producing bug fixes and security updates for versions of IE that were more than 10 years old.

The change means that it will only be supporting versions 9 and above of Internet Explorer. Users of different editions of Windows will be expected to be using the latest copy for that release. For instance, people and businesses running Windows 8.1 will only get bug fixes and security updates if they are on IE11.

Microsoft has also made other moves to improve security on its browser. From 12 August, Explorer will start to block some out-of-date add-ons, known as ActiveX controls, for the program.

In a blogpost, Microsoft said out of data add-ons were regularly targeted by cyber-thieves as a way to subvert browsers and steal data. The regular monthly update for IE will bring in the change that blocks out-of-date add-ons.


23.52 | 0 komentar | Read More

Authors rally in Amazon dispute

8 August 2014 Last updated at 11:48

More than 900 authors are making a public appeal to Amazon to end a bitter publishing dispute that they say has been "hurting" writers and readers.

Authors including James Patterson and Donna Tartt have signed a letter to the retailer that is due to appear as a full-page advert in the New York Times.

Amazon is in a battle with Hachette, one of the world's biggest publishers, over the terms of e-book sales.

The authors said their books had been "taken hostage" by Amazon's tactics.

The online retailer has delayed delivery, prevented pre-orders and removed discounts for books by some Hachette authors, who include JK Rowling, Stephanie Meyer and David Baldacci.

'Misleading customers'

The letter said Amazon had singled out a group of authors for "selective retaliation" and was "inconveniencing and misleading its own customers with unfair pricing and delayed delivery".

"Many of us have supported Amazon since it was a struggling start-up," the letter continued.

"Our books launched Amazon on the road to selling everything and becoming one of the world's largest corporations.

"We have made Amazon many millions of dollars and over the years have contributed so much, free of charge, to the company by way of co-operation, joint promotions, reviews and blogs.

"This is no way to treat a business partner. Nor is it the right way to treat your friends.

"Without taking sides on the contractual dispute between Hachette and Amazon, we encourage Amazon in the strongest possible terms to stop harming the livelihood of the authors on whom it has built its business."

The letter concludes by asking readers to email Amazon founder Jeff Bezos to urge him to end the dispute. The New York Times said the letter was scheduled to appear as a full-page ad on Sunday.

Amazon's price push

Other Hachette authors to have signed up include Baldacci, Sandra Brown, Jeffery Deaver, Malcolm Gladwell and Daniel Handler, who writes as Lemony Snicket.

Lee Child, Paul Auster, John Grisham, Philip Pullman and Stephen King - who are published by other houses - have also added their names.

But some of Hachette's biggest names, including Rowling and Meyer, have not.

In a recent blog, Amazon said e-books were too expensive and most should cost $9.99 (£5.95) rather than the current $14.99 (£8.92) or £19.99 (£11.90).

"That is unjustifiably high for an e-book," the company wrote.

"With an e-book, there's no printing, no over-printing, no need to forecast, no returns, no lost sales due to out-of-stock, no warehousing costs, no transportation costs, and there is no secondary market - e-books cannot be resold as used books. E-books can be and should be less expensive."

Prices 'artificially high'

If prices were lowered, Amazon said, more books would be sold and total revenues would be higher. Hachette was also "sharing too small a portion with the author", it added.

Meanwhile, a petition in support of Amazon, which claims Hachette wants to keep e-book prices "artificially high", has attracted 7,600 signatures, including a number of self-published authors who praised the retailer for creating a more democratic industry.

One, Theresa Ragan, wrote that she had failed to get the attention of established publishers until Amazon allowed her to self-publish.

"They allowed readers to decide whether or not they wanted to read my books," she wrote. "What a concept! Since that time, I've sold over one million e-books."


23.52 | 0 komentar | Read More

Bitcoin heist diverts net traffic

8 August 2014 Last updated at 12:51

More than $83,000 (£50,000) in virtual cash has been stolen by a thief who managed to hijack net traffic from 19 separate ISPs, say security experts.

The hijacked data was involved in the "mining pools" that generate virtual cash and keep track of who spent what.

The thief directed the results of the mining and transaction tracking to his own server so he could cash in.

Internal access to a Canadian ISP allowed the thief to divert traffic, said experts.

The theft was uncovered by security researcher Joe Stewart, who was part of one of the mining pools that was hit by the thief.

Mining pools underpin the way many different crypto currencies work. They involve people connecting up their home computers to process the information generated when virtual cash is spent, swapped or gifted.

In return for doing this hard computational work, miners are regularly rewarded with freshly minted coins.

By regularly diverting traffic passing between members of several different mining pools, the attacker was able to reap all the rewards for themselves, Mr Stewart told Wired.

"Some people are more attentive to their mining rigs than others," he said. "Many users didn't check their set-ups for weeks, and they were doing all this work on behalf of the hijacker."

The targeted hijacks only lasted 30 seconds but that was long enough to trick the collaborating computers into handing over the results of their work to the attacker.

At its height the attack netted more than $9,000 (£5,350) a day in bitcoins, dogecoins and worldcoins for the thief.

The diversion was made possible by the attacker gaining access to the internal systems at a Canadian ISP from where they were able to tell net hardware to reroute traffic.

The attack started in February but was shut down in May when it was detected.


23.52 | 0 komentar | Read More

Facebook must reveal underage users

8 August 2014 Last updated at 16:34

Facebook must disclose any available records on the number of underage account holders in Northern Ireland, the High Court in Belfast has ruled.

It ruled any existing records should be supplied for a lawsuit that involves a vulnerable girl who contacted men and posted sexual photos on the website.

Facebook is being sued by the girl's father, for alleged negligence and breaching her right to privacy.

Under Facebook's own policy, no-one under 13 should set up an account.

But with the schoolgirl now under a care order, lawyers for her father claimed an open registration system meant it was too easy for her to set up profiles and be at potential risk from paedophiles.

From the age of 11, she created four different accounts to publish sexually suggestive and inappropriate photos, the court heard.

She received text messages with extreme sexual content from men as a result of her personal details appearing on Facebook, it is alleged.

However, her accounts were deactivated as soon as reports were received by the company.

As part of the ongoing legal action, attempts were made to secure more details about the number of underage users reported and identified.

In a detailed ruling, the judge blocked many other requests for more information from Facebook.

But he held that specific discovery should be made on any documentation containing notes and records that company holds on use of its network by children under 13 in Northern Ireland or the UK as a whole, between 2011 and 2014.

"If the defendants do have them, they should be discovered," the judge said.

"If they do not have them, then obviously they can properly indicate that they do not have such information in their possession, custody or power."

The same ruling was made on a request for details on the number of account holders in Northern Ireland generally.

According to the judge, that information appeared relevant to assessing the size of the task confronting Facebook "if taking steps to address the mischief of underage children registering".

The court also heard the company does not retain data on reports of underage users for more than six months.

Countering the claim that no more statistics were available, a lawyer for the girl's father cited an alleged statement by its chief privacy advisor in 2011 that 20,000 people a day are removed from the site for being underage.

Despite recognising the "factual standoff" on the issue, the judge refused to order Facebook to comply with that request, on the basis that it does not have the information.

He added: "If it should emerge that the defendant's assertions are unsustainable, then at the very least the case may be adjourned in order to compel appropriate replies to the interrogatories with attendant cost consequences."


23.52 | 0 komentar | Read More

'Sketchy' app sparks racism row

8 August 2014 Last updated at 23:02 By Kim Gittleson BBC business reporter, New York

The BBC does not pay its staff a hardship allowance to live in New York City - but maybe it should.

That's at least according to a new app, SketchFactor, which launched on Friday.

The app uses crowd-sourced data from users to pinpoint "sketchy" areas as well as to provide safe walking directions.

It says that just down the block from the BBC's bureau here, a "random, super tall, super heavy dude" is going about giving unwanted bear hugs.

In fact, several alarming red flags pop up when one looks at the area around the bureau.

But in reading the comments, some reports are not as threatening.

"There's a homeless shelter or something that houses the poor here. The residents hang out front and never bother anyone, but it's uncomfortable as you pass an otherwise nice area," reads one.

'Tone deaf app'

It is comments like these that have landed the app's founders, Allison McGuire and Daniel Herrington, in hot water.

"White people create terrible app to avoid, um, sketchy areas" was one headline. "Want to Avoid Black Neighbourhoods? There's an App for That" was another.

The founders did not reply to a request for comment, but on their website sought to refute such claims.

"SketchFactor is a tool for anyone, anywhere, at any time," they wrote.

"We have a reporting mechanism for racial profiling, harassment, low lighting, desolate areas, weird stuff, you name it."

They add that they tested the app with 100 people in various community groups in New York.

Ms McGuire says she was inspired to create the app after living in Washington DC as a young non-profit worker.

After getting supportive feedback, she and her co-founder Mr Herrington quit their jobs and moved to New York City.

The app was a finalist in a city-sponsored BigApps competition, and has several thousand dollars in investment.

In addition to user data, the app also incorporates public crime data and trusted sources.

Crowdsourcing safety

SketchFactor is just one of many products that aim to crowdsource safety information about the areas in which users live and walk - and it is not the first to be hit with the racism label.

Last autumn, the briefly-lived GhettoTracker.com came under fire both for its name, which many found offensive, and because in labelling an area a "ghetto", it took into account user feedback and not official data such as crime rates. (It later changed its name to Good Part of Town before disappearing altogether.)

In 2012, when Microsoft was granted a patent for technology which would incorporate crime data when providing walking directions in its Bing maps service, it was dubbed the "avoid ghetto" GPS patent.

Some apps have had success by focusing more on specific communities: Nextdoor is a private social network in which users in specific neighbourhoods can communicate about local issues, including reporting crime and working with police to solve issues.

The key, say experts, are the users.

"Technology is only as good as the people who form part of its developer and user community," Seeta Pena Gangadharan, a senior research fellow at the New America Foundation's Open Technology Institute, told the BBC.

"A tool like SketchFactor might actually be incredibly powerful for a community in building safety by allowing people to share stories but it really does depend on the context. You could imagine a community that might have a xenophobic tendencies or exclusionary tendencies to use an app like that as an extension of already existing biases."


23.52 | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger