Protect your privacy – Start now with Signal
Autocracies always implement broad surveillance methods in order to identify and punish resistance. Surveillance can take many forms including the capture of your social media posts and email, monitoring your connections to web sites, and preventing the use of private communications through encryption back-doors and other means.
Take action now to create ways to communicate privately with your family, friends and colleague…
Dual Protection Ring: User Profiling Via Differential Privacy and Service Dissemination Through Private Information Retrieval
Imdad Ullah, Najm Hassan, Tariq Ahamed Ahangar, Zawar Hussain Shah, Mehregan Mahdavi Andrew Levula
https://arxiv.org/abs/2506.13170
❓ for privacy-minded folks- anyone have a recommendation for a scale that measures more than weight (ex. muscle mass, fat %) but is also privacy-protecting?
And ideally has an “app” or interface that can track the info, see trends over time, etc.
Many choices online… but I have no idea where they are sending data (or to whom they are selling it).
Most private option of course is a scale that keeps all data local, but there is convenience in an app that easily tracks data, s…
A security researcher said
flaws in a carmaker’s online dealership portal
exposed the private information
and vehicle data of its customers,
and could have allowed hackers to remotely break into any of its customers’ vehicles.
Eaton Zveare, who works as a security researcher at software delivery company Harness,
told TechCrunch the flaw he discovered
allowed the creation of an admin account
that granted “unfettered access” to the unnamed carma…
An Enhanced Privacy-preserving Federated Few-shot Learning Framework for Respiratory Disease Diagnosis
Ming Wang, Zhaoyang Duan, Dong Xue, Fangzhou Liu, Zhongheng Zhang
https://arxiv.org/abs/2507.08050 https://arxiv.org/pdf/2507.08050 https://arxiv.org/html/2507.08050
arXiv:2507.08050v1 Announce Type: new
Abstract: The labor-intensive nature of medical data annotation presents a significant challenge for respiratory disease diagnosis, resulting in a scarcity of high-quality labeled datasets in resource-constrained settings. Moreover, patient privacy concerns complicate the direct sharing of local medical data across institutions, and existing centralized data-driven approaches, which rely on amounts of available data, often compromise data privacy. This study proposes a federated few-shot learning framework with privacy-preserving mechanisms to address the issues of limited labeled data and privacy protection in diagnosing respiratory diseases. In particular, a meta-stochastic gradient descent algorithm is proposed to mitigate the overfitting problem that arises from insufficient data when employing traditional gradient descent methods for neural network training. Furthermore, to ensure data privacy against gradient leakage, differential privacy noise from a standard Gaussian distribution is integrated into the gradients during the training of private models with local data, thereby preventing the reconstruction of medical images. Given the impracticality of centralizing respiratory disease data dispersed across various medical institutions, a weighted average algorithm is employed to aggregate local diagnostic models from different clients, enhancing the adaptability of a model across diverse scenarios. Experimental results show that the proposed method yields compelling results with the implementation of differential privacy, while effectively diagnosing respiratory diseases using data from different structures, categories, and distributions.
toXiv_bot_toot
Well this is fun, #Ohio HB96 seems that it would require me to pay to to collect and store your state issued ID if you want to browse Mastodon via this instance.
That's fine, I don't mind spending money which I don't have to collect users' private data including your home address and full legal name. You're fine with giving effectively a complete stranger acro…
Remember the good old days when you could send an letter to the US Gov't at Fort Collins, Colorado. You'd include a self-addressed stamped envelope and a cassette tape and they would return the cassette with a recording of WWV so that you could set your clocks.
You think that is silly? Is it any more silly than that the maga-klan is trying to make US citizens buy weather (data that was acquired via US assets and taxes) from private dealers such as Accuweather?
Wall Street giants like Blackstone, KKR, and BlackRock are pouring hundreds of billions into AI data centers, creating concerns of "oversupply" and a bubble (Maureen Farrell/New York Times)
https://www.nytimes.com/2025/06/02/business/ai-da…
Dual Protection Ring: User Profiling Via Differential Privacy and Service Dissemination Through Private Information Retrieval
Imdad Ullah, Najm Hassan, Tariq Ahamed Ahangar, Zawar Hussain Shah, Mehregan Mahdavi Andrew Levula
https://arxiv.org/abs/2506.13170
Maybe it's time for security forces to understand that information security is a) also important and b) easily compromised. The Strava vulnerability is a known issue - I saw news articles about that a few years ago. But surely by now the security world should know that any app that shares information on an unsecure system is a risk?
And I wonder what a review of how this is playing out in the US would show. Inquiring minds, and all that.
Maybe it's time for security forces to understand that information security is a) also important and b) easily compromised. The Strava vulnerability is a known issue - I saw news articles about that a few years ago. But surely by now the security world should know that any app that shares information on an unsecure system is a risk?
And I wonder what a review of how this is playing out in the US would show. Inquiring minds, and all that.
The scale of investment and the involvement of governments means ROI must be found (or rather created) now, by any means necessary! Demand already is being forcefully created to justify these expenditures. Business models, regulations and policies/politics are pivoted in lockstep. Aside from all the conceptual, ethical and environmental issues of LLMs and their required infrastructure, these shifts are already also impacting chip/hardware production pipelines and start spelling the end of pe…
Optimizing Federated Learning for Scalable Power-demand Forecasting in Microgrids
Roopkatha Banerjee, Sampath Koti, Gyanendra Singh, Anirban Chakraborty, Gurunath Gurrala, Bhushan Jagyasi, Yogesh Simmhan
https://arxiv.org/abs/2508.08022
My great failure in life is that I never put myself in a position to monetise being this embarrassingly incompetent.
#auspol #australia #government
A malicious Jira ticket can cause Cursor to exfiltrate secrets from the repository or local file system. But this is not just a problem with Cursor: GitHub MCP connections can also be exploited to expose private repository data, and a vulnerability in GitLab Duo allowed private information to be exposed through automatically rendered HTML code.
This is just one example. "MCP" the protocol for "AI agents" is basically without security measures. It's like running random code on your infrastructure and data.
(Original title: GitHub MCP Exploited: Accessing private repositories via MCP)
https://simonwillison.net…
Trump administration is launching a new private health tracking system with Big Tech’s help
The system
-- spearheaded by an administration that has already freely shared highly personal data about Americans in ways that have tested legal bounds
-- could put patients’ desires for more convenience at their doctor’s office on a collision course with their expectations that their medical information be kept private.
“There are enormous ethical and legal concerns,”
…
"DOGE secured the power to view records that contain competitors’ trade secrets, nonpublic details about government contracts, and sensitive regulatory actions or other information."
'Vulnerable': New alarm as Musk's 'God tier access' to damaging data revealed - Raw Story
https://www.rawstory.com/musk-private-data/
Not really sure about the concerns related to data. I'm of the opinion that government should be creating and opening *more* documents and data to all data users, including all AI companies.
(Obviously I don't mean private and meaningfully confidential data. I mean reports, minutes, procedures, basically any non-confidential document obtainable via FOIA.)
Data privacy experts are calling on the government to urgently tighten regulation around facial recognition technology, amid growing concerns over its unregulated use by police forces and private companies across the UK.
https://www.computing.co.uk/news/202…
Incredible if you think about it...
"The bug, when exploited, allows hackers to steal private digital keys from SharePoint servers without needing any credentials to log in. Once in, the hackers can remotely plant malware, and gain access to the files and data stored within"
Big #Microsoft
Private Memorization Editing: Turning Memorization into a Defense to Strengthen Data Privacy in Large Language Models
Elena Sofia Ruzzetti, Giancarlo A. Xompero, Davide Venditti, Fabio Massimo Zanzotto
https://arxiv.org/abs/2506.10024

Private Memorization Editing: Turning Memorization into a Defense to Strengthen Data Privacy in Large Language Models
Large Language Models (LLMs) memorize, and thus, among huge amounts of uncontrolled data, may memorize Personally Identifiable Information (PII), which should not be stored and, consequently, not leaked. In this paper, we introduce Private Memorization Editing (PME), an approach for preventing private data leakage that turns an apparent limitation, that is, the LLMs' memorization ability, into a powerful privacy defense strategy. While attacks against LLMs have been performed exploiting previou…
Differentially Private Space-Efficient Algorithms for Counting Distinct Elements in the Turnstile Model
Rachel Cummings, Alessandro Epasto, Jieming Mao, Tamalika Mukherjee, Tingting Ou, Peilin Zhong
https://arxiv.org/abs/2505.23682
Indoor Sharing in the Mid-Band: A Performance Study of Neutral-Host, Cellular Macro, and Wi-Fi
Joshua Roy Palathinkal, Muhammad Iqbal Rochman, Vanlin Sathya, Mehmet Yavuz, Monisha Ghosh
https://arxiv.org/abs/2506.04974
A deep dive into Apple TV's privacy features shows that Apple's streaming device is more private than the vast majority of alternatives, save for dumb TVs (Scharon Harding/Ars Technica)
https://arstechnica.com/gadgets/2025/0
Whatever is left of our constitutional rights and liberties exists mostly in the gaps between what the government knows about us. This is the beginning of the end. Soon, when conservatives are in charge, they'll make us follow their stupid, puritanical rules whether we like it or not, and when liberals are in charge, well, they'll make us follow [i]their[/i] stupid, puritanical rules whether we like it or not.
1/2
Aim High, Stay Private: Differentially Private Synthetic Data Enables Public Release of Behavioral Health Information with High Utility
Mohsen Ghasemizade, Juniper Lovato, Christopher M. Danforth, Peter Sheridan Dodds, Laura S. P. Bloomfield, Matthew Price, Team LEMURS, Joseph P. Near
https://arxiv.org/abs/2507.02971
Benchmarking and Parallelization of Electrostatic Particle-In-Cell for low-temperature Plasma Simulation by particle-thread Binding
Libn Varghese, Bhaskar Chaudhury, Miral Shah, Mainak Bandyopadhyay
https://arxiv.org/abs/2506.21524
Dependency on Meta AI Chatbot in Messenger Among STEM and Non-STEM Students in Higher Education
Hilene E. Hernandez, Rhiziel P. Manalese, Roque Francis B. Dianelo, Jaymark A. Yambao, Almer B. Gamboa, Lloyd D. Feliciano, Mike Haizon M. David, Freneil R. Pampo, John Paul P. Miranda
https://arxiv.org/abs/2507.21059
Israel-based Noma Security, whose platform secures enterprise data and AI models against AI agents, raised a $100M Series B, bringing its total funding to $132M (Steven Scheer/Reuters)
https://www.reuters.com/world/middle-east/
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks
Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li
https://arxiv.org/abs/2506.10424
Authenticated Private Set Intersection: A Merkle Tree-Based Approach for Enhancing Data Integrity
Zixian Gong, Zhiyong Zheng, Zhe Hu, Kun Tian, Yi Zhang, Zhedanov Oleksiy, Fengxia Liu
https://arxiv.org/abs/2506.04647
Testbed and Software Architecture for Enhancing Security in Industrial Private 5G Networks
Song Son Ha, Florian Foerster, Thomas Robert Doebbert, Tim Kittel, Dominik Merli, Gerd Scholl
https://arxiv.org/abs/2507.20873
Differentially Private Synthetic Data Release for Topics API Outputs
Travis Dick, Alessandro Epasto, Adel Javanmard, Josh Karlin, Andres Munoz Medina, Vahab Mirrokni, Sergei Vassilvitskii, Peilin Zhong
https://arxiv.org/abs/2506.23855