CYBER

VICE

Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.

Hosted on Acast. See acast.com/privacy for more information.

read less

Voice Generating-AI Is Now the Plaything of 4Chan
09-02-2023
Voice Generating-AI Is Now the Plaything of 4Chan
AI has made the voice of Emma Watson say some very strange things, and 4Chan is to blame. But trolls playing with new machine-learning tools aren’t the only villain in this story. Actors are being asked to sign away the rights to their own voice for the purposes of AI reconstruction.Also on today’s episode: Dutch police have been reading encrypted messages; some politicians in the UK want to ban encrypted phones; Apple is looking to roll out a new form of end-to-end encryption; and a police contractor that promised to track homeless people has been hacked.Cypher. We’re bringing it back. For those that don’t know, Cypher is a special edition of Cyber where we decipher the week’s news. It’s a potpourri for the panopticon. A grab bag of tech horror stories. And who better to join us for such an adventure than Motherboard reporter Joseph Cox?Stories discussed in this episode:AI-Generated Voice Firm Clamps Down After 4chan Makes Celebrity Voices for AbuseUK Proposes Making the Sale and Possession of Encrypted Phones Illegal‘Disrespectful to the Craft:’ Actors Say They’re Being Asked to Sign Away Their Voice to AIDutch Police Read Messages of Encrypted Messenger 'Exclu'Apple's End-to-End iCloud Could Be a Security Game ChangerPolice Contractor That Promised to Track Homeless People HackedWe’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. Hosted on Acast. See acast.com/privacy for more information.
The Trans Dataset Built Without Permission and Stored Improperly
05-01-2023
The Trans Dataset Built Without Permission and Stored Improperly
Facial recognition technology is here. Whether we like it or not, cameras all across the world are scanning faces and building databases. There’s a popular misconception that technology is objective and unbiased. But that’s not true. All systems carry the biases of the people who created them, and nowhere is that more evident than in facial recognition systems.Today’s show is about how those biases come to bear, and the dangers of running recklessly forward without considering the consequences. All the way back in 2013, the University of North Carolina, Wilmington published a dataset meant for facial recognition systems. It contained more than 1 million images of trans people, pulled from YouTube, showing them at various stages of their transition.This was done without the permission of the original posters. Why? Because terrorists might take hormones to alter their face and beat border control systems.It gets weirder from there.Here to help us tell the story is Os Keyes. Keyes is a researcher and PhD candidate at the University of Washington’s Department of Human Centered Design & Engineering. They’re also the co-author of Feeling fixes: Mess and emotion in algorithmic audits, which is a scientific audit of the dataset we’re going to be talking about today.Stories discussed in this episode:Facial Recognition Researcher Left a Trans Database Exposed for Years After Using Images Without PermissionWe’re recording CYBER live on Twitch and YouTube. Watch live during the week. Follow us there to get alerts when we go live. We take questions from the audience and yours might just end up on the show.Subscribe to CYBER on Apple Podcasts or wherever you listen to your podcasts. Hosted on Acast. See acast.com/privacy for more information.