News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Removing Faces From Protest Photos: A Digital Security Strategy.

When photographing a protest, hiding faces and scrubbing metadata is vital to protect your identity and avoid potential repercussions. Many consider it essential to obscure the faces of people in any photos posted online to prevent authorities from collecting and using that information. By removing facial features and metadata, protesters can safeguard their digital presence and maintain control over how their images are used.

See Also

How to Find Images in Google Photos Δ1.71

Google Photos provides users with various tools to efficiently locate specific images and videos within a vast collection, making it easier to navigate through a potentially overwhelming library. Features such as facial recognition allow users to search for photos by identifying people or pets, while organizational tools help streamline the search process. By enabling face grouping and utilizing the search functions available on both web and mobile apps, users can significantly enhance their experience in managing their photo archives.

Americans Take More than 200 Billion Photos Every Year, Just a Mere 3% End up in a Good Old Print Δ1.70

Vast photo archives exist, yet most images remain unseen. Digital storage dominates, but future generations may lose precious memories, report warns. The decline of printed photos is a loss of tangible history, as Americans increasingly rely on digital storage for their cherished moments.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.69

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.

Google Changes Photo Frame Features Due to API Update Δ1.68

Google's recent change to its Google Photos API is causing problems for digital photo frame owners who rely on automatic updates to display new photos. The update aims to make user data more private, but it's breaking the auto-sync feature that allowed frames like Aura and Cozyla to update their slideshows seamlessly. This change will force users to manually add new photos to their frames' albums.

AI Is Changing Camera Tech for the Better but Photography for the Worse Δ1.68

AI has revolutionized some aspects of photography technology, improving efficiency and quality, but its impact on the medium itself may be negative. Generative AI might be threatening commercial photography and stock photography with cost-effective alternatives, potentially altering the way images are used in advertising and online platforms. However, traditional photography's ability to capture moments in time remains a unique value proposition that cannot be fully replicated by AI.

Behind the Scenes of Online Child Abuse Removal Efforts Δ1.68

The Internet Watch Foundation's analysts spend their days trawling the internet to remove the worst child sex abuse images online, a task that is both crucial and emotionally draining. Mabel, one of the organization's analysts, describes the work as "abhorrent" but notes that it also allows her to make a positive impact on the world. Despite the challenges, organizations like the IWF are helping to create safer online spaces for children.

7 Rules to Follow Before Installing a Home Security Camera - And Where You Should Never Put One Δ1.68

Installing a home security camera requires careful consideration to optimize its effectiveness and to avoid legal repercussions regarding privacy. Key factors include avoiding obstructions, ensuring proper positioning to capture critical areas without infringing on neighbors' privacy, and steering clear of heat sources that could damage the equipment. By following these guidelines, homeowners can enhance security while respecting the legal and ethical boundaries of surveillance.

Faceminer Builds a Biometric Data-Harvesting Empire. Δ1.68

Faceminer is a narrative simulation game set in the late 1990s, where players construct a biometric data-harvesting empire amid the optimism surrounding Y2K. Players must efficiently manage resources, collect vast amounts of data, and navigate the consequences of unethical practices to grow their operations. The game critiques mass data hoarding and surveillance, highlighting the dangers of concentrating power in the hands of a few.

The Week in Photos: A Selection of Top Photography From Around the World Δ1.68

A selection of some of our top photography from around the world this week showcases moments of social unrest, international diplomacy, and cultural events. From protests and power outages to fashion shows and awards ceremonies, the images capture a glimpse of global life. With 27 photographs, the collection offers a visual narrative of current events.

Investigation Into Social Media Companies Over Children's Personal Data Practices Δ1.67

Britain's privacy watchdog has launched an investigation into how TikTok, Reddit, and Imgur safeguard children's privacy, citing concerns over the use of personal data by Chinese company ByteDance's short-form video-sharing platform. The investigation follows a fine imposed on TikTok in 2023 for breaching data protection law regarding children under 13. Social media companies are required to prevent children from accessing harmful content and enforce age limits.

UK Probes How TikTok, Reddit, and Imgur Protect Child Privacy Δ1.67

The U.K.'s Information Commissioner's Office (ICO) has initiated investigations into TikTok, Reddit, and Imgur regarding their practices for safeguarding children's privacy on their platforms. The inquiries focus on TikTok's handling of personal data from users aged 13 to 17, particularly concerning the exposure to potentially harmful content, while also evaluating Reddit and Imgur's age verification processes and data management. These probes are part of a larger effort by U.K. authorities to ensure compliance with data protection laws, especially following previous penalties against companies like TikTok for failing to obtain proper consent from younger users.

"Fake Nudes: Youths Confront Harms" Δ1.67

Teens increasingly traumatized by deepfake nudes clearly understand that the AI-generated images are harmful. A surprising recent Thorn survey suggests there's growing consensus among young people under 20 that making and sharing fake nudes is obviously abusive. The stigma surrounding creating and distributing non-consensual nudes appears to be shifting, with many teens now recognizing it as a serious form of abuse.

Anti-Trump Activists Target Elon Musk's Tesla Brand to Protest DOGE Cuts Δ1.67

A grassroots movement has emerged, with approximately 350 demonstrators protesting outside Tesla dealerships to voice their discontent over Elon Musk's involvement in significant federal job cuts. Organizers are urging the public to boycott Tesla, aiming to tarnish its brand image and impact Musk financially due to his controversial role in the Trump administration. This activism highlights the intersection of corporate branding and political sentiment, as Tesla, once celebrated for its environmental focus, is now perceived as a symbol of the current administration’s policies.

Trump Administration Targets Climate Change Information Δ1.67

The Trump administration has launched a campaign to remove climate change-related information from federal government websites, with over 200 webpages already altered or deleted. This effort is part of a broader trend of suppressing environmental data and promoting conservative ideologies online. The changes often involve subtle rewording of content or removing specific terms, such as "climate," to avoid controversy.

UK Asks Social Media Firms to Assess Online Risks by March 31 Δ1.66

Britain's media regulator Ofcom has set a March 31 deadline for social media and other online platforms to submit a risk assessment around the likelihood of users encountering illegal content on their sites. The Online Safety Act requires companies like Meta, Facebook, Instagram, and ByteDance's TikTok to take action against criminal activity and make their platforms safer. These firms must assess and mitigate risks related to terrorism, hate crime, child sexual exploitation, financial fraud, and other offences.

Reforming Digital Age of Consent to Protect Children Online Δ1.66

The proposed bill has been watered down, with key provisions removed or altered to gain government support. The revised legislation now focuses on providing guidance for parents and the education secretary to research the impact of social media on children. The bill's lead author, Labour MP Josh MacAlister, says the changes are necessary to make progress on the issue at every possible opportunity.

TikTok’s American Ownership Rule Ignores Bigger IoT Threat Δ1.66

The debate over banning TikTok highlights a broader issue regarding the security of Chinese-manufactured Internet of Things (IoT) devices that collect vast amounts of personal data. As lawmakers focus on TikTok's ownership, they overlook the serious risks posed by these devices, which can capture more intimate and real-time data about users' lives than any social media app. This discrepancy raises questions about national security priorities and the need for comprehensive regulations addressing the potential threats from foreign technology in American homes.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.66

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.66

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

UK Quietly Scrubs Encryption Advice From Government Websites Δ1.66

The U.K. government has removed recommendations for encryption tools aimed at protecting sensitive information for at-risk individuals, coinciding with demands for backdoor access to encrypted data stored on iCloud. Security expert Alec Muffet highlighted the change, noting that the National Cyber Security Centre (NCSC) no longer promotes encryption methods such as Apple's Advanced Data Protection. Instead, the NCSC now advises the use of Apple’s Lockdown Mode, which limits access to certain functionalities rather than ensuring data privacy through encryption.

DEI Is Under Attack in US, Might Live On Under Different Name Δ1.65

The US government's Diversity, Equity, and Inclusion (DEI) programs are facing a significant backlash under President Donald Trump, with some corporations abandoning their own initiatives. Despite this, there remains a possibility that similar efforts will continue, albeit under different names and guises. Experts suggest that the momentum for inclusivity and social change may be difficult to reverse, given the growing recognition of the need for greater diversity and representation in various sectors.

Methane Detection Gains Ground with New Technologies. Δ1.65

New methane detectors are making it easier to track the greenhouse gas, from handheld devices to space-based systems, offering a range of options for monitoring and detecting methane leaks. The increasing availability of affordable sensors and advanced technologies is allowing researchers and activists to better understand the extent of methane emissions in various environments. These new tools hold promise for tackling both small leakages and high-emitting events.

Securely Erasing Your Digital Footprint with a Data Shredder Stick Δ1.65

A data shredder stick is the easiest and most secure way to wipe your old laptop's contents, providing peace of mind when selling or recycling it. This Windows-friendly tool overwrites data, making it impossible to recover once done, giving users greater control over their digital legacy. By using a data shredder stick, individuals can ensure their personal information and files are protected from falling into the wrong hands.

The Firefox I Loved Is Gone - How to Protect Your Privacy on It Now Δ1.65

Mozilla's recent changes to Firefox's data practices have sparked significant concern among users, leading many to question the browser's commitment to privacy. The updated terms now grant Mozilla broader rights to user data, raising fears of potential exploitation for advertising or AI training purposes. In light of these developments, users are encouraged to take proactive steps to secure their privacy while using Firefox or consider alternative browsers that prioritize user data protection.

The Power of Small-Screen Storytelling Globally Reaches New Heights Δ1.65

A 100-pixel video can teach us about storytelling around the world by highlighting the creative ways in which small-screen content is being repurposed and reimagined. CAMP's experimental videos, using surveillance tools and TV networks as community-driven devices, demonstrate the potential for short-form storytelling to transcend cultural boundaries. By leveraging public archives and crowdsourced footage, these artists are able to explore and document aspects of global life that might otherwise remain invisible.