After a series of failures, the US Air Force on Monday announced that it has finally succeeded in the test launch of its air-launched hypersonic missile, a technology China has long mastered and even put on public display at a recent air show.
The US’ scheme is to use the hypersonic missile and the recently revealed B-21 stealth bomber to penetrate China’s air defense, but the Chinese People’s Liberation Army (PLA) has what it takes to defend the country, experts said on Tuesday.
A full prototype of the Air-launched Rapid Response Weapon, also known as the AGM-183A missile, was launched from a B-52 bomber off the coast of California on Friday, and all of the objectives of the test were met, CNN reported on Monday, citing a statement from the US Air Force.
The AGM-183A is a boost-glide missile that uses a booster rocket to accelerate a projectile to hypersonic speeds, before a glide vehicle separates from the booster and uses inertia to travel to its target, CNN said.
The successful test launch of the missile came after a series of failures in testing last year, forcing the Air Force to delay the project at a time when China and Russia have shown advances in their own programs, CNN reported.
During the Airshow China 2022 held in Zhuhai, South China’s Guangdong Province in November, the PLA Air Force put on display an H-6K bomber which carried a type of missile widely believed to be hypersonic.
China also displayed the DF-17 hypersonic boost-glide missile at the National Day military parade on October 1, 2019 in Beijing.
Russia’s Kinzhal hypersonic air-launched ballistic missile has also been reportedly deployed in combat in the Ukraine crisis.
With China and Russia taking the lead in hypersonic weapons development, the US is hurrying to build ones of its own, with the rush felt in several previous failures, a Chinese military expert who requested anonymity told the Global Times on Tuesday.
Compared with its Chinese and Russian counterparts, as well as air-breathing hypersonic missiles, the AGM-183A should not be considered very advanced, the expert said.
On December 2, the US Air Force’s next-generation stealth bomber, the B-21, made its public debut.. The US wants to use the low-end B-52 bomber which cannot penetrate air defense on its own to carry the strongly penetrative, standoff AGM-183A hypersonic missile, and use the high-end B-21 stealth bomber to drop inexpensive munitions within the opponent’s defense lines, Zhang Xuefeng, another Chinese military expert, told the Global Times.
Chinese military aviation expert Fu Qianshao told the Global Times that the AGM-183A can be intercepted before it is launched from the B-52, which is a large and slow target that can never be stealth.
Another option, which can also counter the B-21, is to attack bases and airfields where the bombers are deployed, Fu said.
China recently carried out the maiden flight for a type of new high-altitude, high-speed demonstrator drone, which can ...
HELSINKI
— China launched its new Jielong-3 rocket from a mobile sea platform in
the Yellow Sea Friday, successfully sending 14 satellites into orbit.
The Jielong-3 (“Smart Dragon-3”) lifted off at 1:35 a.m. Eastern (0635
UTC) Dec. 9, from the Tai Rui modified barge off in the Yellow Sea.
It is hoped that the US delegation can accurately convey China's attitude back to Washington, which is that we welcome China-US cooperation, but will never accept “cooperation” aimed at weakening,
containing and suppressing China.
In an interview released Sunday, the US' NASA chief once again smeared China's space missions and vowed to beat China in the “moon race.” The latest barrage of attacks was slammed by Chinese experts as a reflection of a lack of confidence
and a dangerous, narrow Cold War mentality in the US.
Shenzhou-14 crew safely return to Dongfeng landing site after 183 days at China Space Station
After concluding six-month stay at the China Space Station and completing first-ever direct handover in orbit in the country's aerospace history, three taikonauts of the Shenzhou-14 manned spaceflight mission have safely returned to the Dongfeng landing site in the Gobi Desert, North China's Inner Mongolia Autonomous Region on
Sunday
5G connectivity promises faster Internet speeds and more efficiency to run complex tasks in the cloud. — 123rf.com
https://youtu.be/iJfCBqPUKHQ
https://youtu.be/6Pvp4Z07ftY
All the ways life could change with technology in 2019.
FASTER data connectivity, smartphones with a bold new look and more reasons to cheer for the national team at a sporting event? These are just some reasons we predict 2019 is going to be another exciting year in technology.
Bend and not break
We could be getting our hands on a foldable smartphone by Samsung very soon – the South Korean tech giant gave the world a glimpse of a working protoype at the Samsung Developer Conference in November.
According to Justin Denison, the senior vice-president of mobile product marketing at Samsung, the prototype measured at 18.5cm diagonally. The new design will give users the experience of having a pocket size device – with a 4.6in screen when folded – that can be unfolded to reveal a bigger tablet-sized 7.4in screen, a feature Samsung has dubbed the Infinty Flex Display.
A foldable phone by Samsung is coming our way in 2019. — AP
Sources told South Korea-based Yonhap News Agency that Samsung is planning to officially launch the device, tentatively known as the Galaxy F as Samsung has not given it an official name yet, at an event in March. Other companies looking to release a foldable smartphone include Huawei and Sony.
Samsung’s foldable device with Infinity Flex Display is a smartphone model that features a tablet-sized screen when unfolded and a smaller screen when folded like a book. — AP
Speaking of Galaxy phones, Samsung also has another highly-anticipated release in 2019 and it’s the flagship Galaxy S10. Some leaks suggest that we could be looking at a device with a bigger full screen bezel-less feature – reputable leaker UniverseIce claimed the model will have a 6.7in display – multiple rear camera setup and interestingly, a punch-hole screen design for the front camera. (Notch? What notch?)
Citing Yonhap News, The Verge reported that the South Korean tech giant is expected to unveil the flagship Galaxy S10 in February 2019, most likely at the Mobile World Congress (MWC) in Spain. Yonhap’s sources also say there are plans to showcase the Galaxy F at MWC ahead of its official March launch.
Gotta move faster
The dawn of 5G network connectivity is upon us. This new technology promises significantly faster data transmission speeds and capacity, less waiting around for an online task to be completed (also known as lower latency), and could connect more smart devices and sensors simultaneously than ever before.
According to Reuters, 5G is currently in the final testing phase and is poised to offer data speeds of up to 50 or even 100 times faster than current 4G networks. In theory, that is.
To test real-world 5G speeds, Qualcomm ran a simulation to approximate real-world 5G speeds in Frankfurt and San Francisco, taking into account various factors such as geography, user demands on the network as well as devices with varying levels of LTE and 5G connectivity.
As reported by The Verge, the tests yielded more down-to-earth but still vastly improved speeds – in Frankfurt, browsing speeds went up from 56Mbps for 4G users to 490Mbps for 5G users, with download speeds clocking in at 100Mbps for over 90% of users compared to 8Mbps on LTE. In San Francisco, browsing speeds jumped up from 71Mbps for the 4G user to 1.4Gbps for the 5G user, while download speeds clocked in at 186Mbps on 5G compared to 10Mbps on 4G.
As 5G is an entirely new technology, users will have to upgrade to new smartphones – to that end, one of the variants of Samsung’s upcoming Galaxy S10 is said to support 5G, according to the Wall Street Journal (WSJ).
Apart from high speed mobile and data services, experts agree that 5G is essential for the next phase in developing technologies like self-driving cars and improving industries like healthcare, virtual and augmented reality and more.
Vodafone demonstrated how a young football fan could get Houghton (left) to teach her some football skills with a holographic 3D call on a 5G network. — AP
In September, Vodafone demonstrated how a live 3D holographic call is possible with 5G at the Vodafone Future Ready Conference in United Kingdom. In the demonstration, English footballer Steph Houghton appeared as a hologram to give an 11-year-old fan some game tips. This exchange showcases how the technology could potentially change the way people communicate with each other, with more chances for remote coaching, training as well as enabling more immersive interactions with famous personalities.
In Malaysia, Communications and Multimedia Minister Gobind Singh Deo announced that Putrajaya and Cyberjaya as testing grounds for national-level 5G trials. The one-year trial began in November and the findings will help the government develop plans and policies on the use of 5G network in the country.
Game on
In 2019, brace yourself for the possible release of another Nintendo Switch. The WSJ reported that Nintendo plans to release a new version of the popular gaming console, with one possible upgrade being a better display.
One of the biggest news in 2018 is Sony announcing that it will not be attending the 2019 E3 Expo for the first time in 24 years. Instead, the company shared that it will be “engaging with consumers and the community in different ways”, with unconfirmed rumours swirling that the company might hold its own event to announce details on the PlayStation 5.
Companies like Sony, Microsoft and Nintendo could all be announcing new gaming consoles in 2019. — AP
According to tech website T3, the PS5 console may include upgrades to support 60FPS (frames per second) at 4K resolution and it will be running on next-generation AMD graphics cards. Sony could also be announcing details about the PlayStation VR2 – upgrades may include better controllers, new built-in cameras and gloves for enhanced virtual reality experience.
One company that is not skipping E3 in 2019 is Microsoft. Speculation is rife that the company will be using the event to announce details about two new next-generation Xbox consoles, codenamed Anaconda and Lockhart. Users could also be looking at a cloud-based streaming-only disc-less version of the Xbox One S for 2019, which could be announced as soon as next month, according to The Verge.
Microsoft is also expected to reveal more details about its Project xCloud, a Netflix-style streaming service for Xbox games. Not to be confused with Xbox Game Pass, Project xCloud – currently in beta testing mode – is said to make Xbox games available across PCs, phones, and consoles.
Gamers can also look forward to major videogame releases in 2019 – there’s the long-awaited Kingdom Hearts 3, The Last Of Us 2 and hopefully, Hideo Kojima’s star-studded and much-hyped Death Stranding.
For mobile gamers, there’s the 2019 release of the Harry Potter Wizards Unite AR game by Niantic, the same developer behind Pokémon Go. The game will allow users to encounter characters and creatures from the Harry Potter books, cast spells and solve mysteries.
Augmented Reality (AR) everywhere
AR technology is not exactly new to platforms like Snapchat and Instagram with its selfie filters, but we could be looking at more than just digital face masks in 2019.
In May, Facebook announced a new version of its AR developing tool AR Studio for content creators and developers. The tool is made for designing AR animations, visuals and interactions for the Facebook Camera. Along with existing features like AR Target Tracker and free-to-use sound files, Facebook said it will be adding other features like Body Tracking, Hand Tracking and analytics for AR effects. So you could expect more AR elements in the photos or videos your friends share on Facebook.
AR is likely to become a bigger part of the way we experience events in real life and consume content on social media platforms. Here, an attendee is trying out an AR baseball game at a trade show in Japan. — Bloomberg
AR could also be a part of more live experiences like concerts and sporting events in 2019. TechCrunch reported that rapper Eminem incorporated AR into his live performance at Coachella music festival in April.
Concertgoers could see added AR visual enhancements to the show by downloading the Eminem Augmented app.
In terms of gaming, something exciting is brewing at Niantic. The company announced that it is investing in holographic augmented reality display – technology developed by waveguide optics firm DigiLens, which specialises in wearable lightweight plastic AR displays. For users, it could mean that Niantic is looking to enhance game play interactivity with an AR device like smart glasses.
Cheer for Malaysia in eSports
Malaysia is beginning to embrace eSports as a mainstream sporting event. In the recent Budget 2019, the government announced a RM10mil budget for the development of eSports in the country.
In 2019, eSports will be a medal event at the South-East Asia Games (SEA) in Philippines. eSports Malaysia secretary-general Rinie Ramli said a national league will be held as the selection process for a squad to represent Malaysia at the SEA Games.
Get set to support a Malaysian eSports team at the 2019 SEA Games. — Bernama
Mobile Legends: Bang Bang is going to be one of the titles contested at the Games, along with other shortlisted titles like Dota 2, StarCraft II, Tekken 7 and Arena Of Valor, according to a recent announcement by the Philippine SEA Games organising committee and its eSports partner, gaming hardware company Razer.
eSports is also currently being considered as a medal event for the 2022 Asian Games in China. However, the plan to announce eSports as an official medal event has been put on hold as the gaming committee does not want a violent or shooting-based game to be contested. Reuters reported that titles for the 2022 Asian Games may feature sports-themed games like Pro Evolution Soccer (PES). Whatever it may be, we’ll look to eSports as a way of getting everyone together to cheer for the same team.
The Internet of Things is a big, juicy target for criminals. — Dreamstime/TNS
As more and more devices connect to the Internet, the risk of them being targeted by criminals is also increasing.
Internet-connected devices are nearly ubiquitous, with computer circuitry now found in a variety of common appliances. They can include security cameras, DVRs, printers, cars, baby monitors, and refrigerators – even “smart” lightbulbs and clothing. Collectively those devices are called the Internet of Things.
The Internet of Things is a big, juicy target for criminals. Up to a million devices were hijacked to create the Mirai botnet which was used to extort companies and bring a university computer system in New Jersey to its knees. The botnet was later exploited to bring down vast swaths of the Internet in a sustained attack on Oct 21, 2016.
Paras Jha, a former Rutgers University student, pleaded guilty Dec 8 with two other men who admitted they wrote the Mirai code. Named after an obscure anime film character, Mirai scoured the Internet for unsecured devices and easily found them.
Once discovered, the Internet of Things devices were hijacked by the Mirai malware and became part of a botnet that launched assaults on Internet service providers and scores of websites. Jha, 21, allegedly monetised the botnet by demanding ransom to call off the attacks, using it to inflate the number of advertising clicks on websites, and renting it out to other hackers for their own nefarious ends.
The attacks on Rutgers’ computer system may have cost the school US$9mil (RM36.70mil), prosecutors said. Rutgers officials told NJ.com the cost of enhancing security was one of the reasons the school hiked tuition in 2016.
When Jha discovered federal investigators were closing in, he released the Mirai source code to the world to cover his tracks. The code is still circulating online and causing damage, according to Brian Krebs, of KrebsOnSecurity.com.
Krebs advises taking these precautions to keep your Internet of Things devices protected:
– Avoid connecting your devices directly to the Internet.
– Change the default credentials to a complex password that only you will know and can remember.
– Check the defaults, and make sure things like UPnP (Universal Plug and Play – which can easily poke holes in your fire wall without you knowing it) are disabled.
– Avoid Internet of Things devices that advertise built-in Peer-to-Peer (P2P) capabilities. P2P Internet of things devices are notoriously difficult to secure, and research repeatedly has shown that they can be reachable even through a fire wall remotely over the internet. That’s because they’re configured to continuously find ways to connect to a global, shared network so that people can access them remotely.
– When it comes to Internet of things devices, cheaper is definitely not better. There is no direct correlation between price and security, but history has shown that less expensive devices tend to have the most vulnerabilities.
The US Department of Justice also offers these tips to protect Internet-connected devices.
– Do your research. Consider the security features of your Internet of things devices before buying. If the device uses a password, make sure it allows you to change it.
– Update firmware when available. Internet of Things devices can be susceptible if not regularly patched. Only install updates from known and reputable sites.
– Disconnect your insecure Internet of Things devices. Outdated security? Can’t update passwords? Then unplug it.
– Turn off Internet of Things devices when not in use, or periodically if otherwise always on. Malware is stored in memory and can often be erased by turning the device off and back on.
– Protect routers and WiFi networks. Use your router’s built-in fire wall, confirm it’s enabled.
– Avoid using public WiFi to check Internet of things devices from a smartphone.
– Use antivirus and intrusion-detection products.
– Ask for help, or hire help, if you can’t figure out fire walls or how to “segment” your network of Internet of things devices.
Some free online resources can help determine whether your devices are susceptible to being accessed by Mirai or other malware. Be cautious and use only well-known sources.
If you suspect your Internet of things device is infected, turn it off and on again to purge the device’s memory. Change the password. — The Philadelphia Inquirer/Tribune News Services
Just
as hurricane trackers chart storms in the Atlantic before they make
landfall, cybersecurity researchers track viral infections that threaten
mayhem. They've found a doozy.
Utilise various services: As different Cloud services are suited to different types of files, it makes sense to spread your files out over several different Cloud storage providers. — Illustrations: MUHAMMAD HAFEEZ AMINUDDIN/The Star
Find the best space for your personal files on the Cloud.
In the movie Creed, Sylvester Stallone’s Rocky Balboa character looks baffled when a young boxer snaps a picture of a handwritten exercise regime with his smartphone instead of just keeping the paper.
Balboa gets even more confused and looks skywards when the young boxer tells him it’s stored on the Cloud so that the information won’t be lost even if he loses his handphone.
It’s hard to deny the rising importance of Cloud computing in our daily lives, as most of the content, services, apps, and even enterprise systems today reside on the Cloud.
Most of us are probably aware of or have used services such as Google Drive, Dropbox and OneDrive.
These services, also known as public Cloud, requires little effort from you other than having to sign up for them.
Most are free and offer up to 15GB of space – if that’s not enough you can subscribe for a nominal sum to bump up storage space.
As these services are mostly operated by tech giants, you don’t have to worry about any of the technical stuff, but on the flipside, you don’t have much control over it.
If you wish to create your own Cloud, it’s now easier than ever as the price of devices and components needed to set up such a service have fallen a lot.
Also known as private Cloud, it allows you to keep your files within your own servers and manage them as you see fit.
It takes a bit of investment and know how – our accompanying story will help you decide if you should go for public or private Cloud.
Here we will explore the best public Cloud services so that you can pick one (or two or three) that meets your needs best.
Free and easy
Almost all the public Cloud offerings have a free option – they differ mostly in the size or additional services offered.
Our pick for the best free Cloud service is Google Drive, as you get 15GB without having to spend a single sen.
More importantly, Google has tied Drive to its online services such as Gmail, Photos and Keep, as well as productivity tools like Docs, Sheets and Slides.
So all your photos and documents will be synced automatically and will be available from one place.
If 15GB option is too limiting then you can opt to subscribe. For US$1.99 (RM8) a month, you get 100GB of additional space.
If you just want sheer volume then try out Mega which offers a whopping 50GB of space for free.
It doesn’t set a limit on file size like most of the other services, but we found the data transfer speed to be a bit slow.
Space for shutterbugs
It goes without saying digital cameras and smartphones in particular have made it easier than ever for everyone to shoot photos.
The real problem, however, is in managing your photos and finding a place to store them.
Most back them up to a desktop or laptop and while it’s better than not backing up at all, is not a good solution as all hard drives have a finite lifespan.
If you don’t have redundancy then you need to find a better solution in the Cloud and we recommend Flickr.
It gets our vote because it offers 1TB of space for free, which should meet the requirements of most users.
Photo size is capped at 200MB while video at 1GB for a single file which is reasonable.
It also has smart photo management which will automatically sort out images according to groups such as animals, people and buildings.
Free users will, however, see ads and will not be able to access the desktop app for uploading photos.
Like most services, it doesn’t support the uncompressed RAW file format which is preferred by photographers who use DSLRs.
If you like keeping your file as RAW, you will need a service like Amazon Cloud Drive which allows you to upload an unlimited number of photos, including RAW files.
Its Unlimited Photos plan will cost you US$11.99 (RM50) a year which is not too bad as RAW files take up a lot of space.
The unlimited offer doesn’t extend to other files, including video – for these files you are limited to only 5GB.
If you need to find space for your videos then you will have to opt for the more expensive plan called Unlimited Everything which costs US$59.99 (RM240) a year. This service, while expensive, lets you upload to your heart’s content.
Cross platform
Nowadays it’s not uncommon to own multiple devices running on different platforms.
If you have, say a MacBook Air for work, Windows PC at home and Android smartphone, you need a Cloud service that supports as many platforms as possible.
While the dominant operating systems – Windows, OS X, Android and iOS are usually supported, other operating systems such as Windows Phone and Linux are often overlooked.
Thankfully Dropbox doesn’t do that – it supports almost every platform, including the ones mentioned above. If you want an alternative, try Box, as it also works on many platforms except Linux.
Embedded data: Foreign tourists taking a selfie with red roses on display for Valentines Day outside a shopping mall in Bangkok, Thailand. Exif data in your pictures can contain a lot of information about where you have been. — EPA
Compared with what’s already happening, Samsung’s warning not to discuss sensitive issues in front of its TVs seems pretty tame. But you can fight back.
SO, your TV might be spying on you. It probably just wanted to join in with the rest of the technology in your life because, let’s face it: if you live in the 21st century you’re probably monitored by half a dozen companies from the moment you wake up to the moment you go to sleep. (And if you wear a sleep tracker, it doesn’t even stop then.)
Compared with some of the technology that keeps a beady eye fixed on you, the news that Samsung’s privacy policy warns customers not to discuss sensitive information in front of their smart TVs is actually fairly tame. The warning relates to a voice-recognition feature that has to be explicitly invoked, and which only begins transmitting data when you say the activation phrase “hi, TV.”
But other tech that spies on you might not be so genteel. The uncomfortable fact is that your personal data is just another way to pay for products and services these days.
The adage “if you are not paying for it, you’re not the customer; you’re the product being sold” was coined in 2010, a lifetime ago in web terms, but it’s as true today as it always has been.
What’s changed now, though, is the number of ways companies are discovering to make sharing our data with them not something we grudgingly accept, but enthusiastically embrace.
Sure, they tell us, you can turn it off. But do you really want to?
1. Facebook’s “like” button
Even if you don’t use Facebook, you will have seen the company’s “like” button springing up in more and more places around the Internet, like a nasty case of chicken pox. If you click on it, you can like the page of a company, person or brand, all without leaving the website you’re on.
The uncomfortable fact is that your personal data is just another way to pay for products and services.
And then there’s Facebook share buttons and Facebook comments, both of which hook in to the company’s servers to provide their own features.
But it’s a two-way relationship: the price you pay for being able to interact with Facebook even without going to their website is that they can see the other websites you’re on, following you around the Internet and using that information to better target ads and content to you back on the mothership.
How to stop it: if you log out of Facebook when you’re done, the site’s ability to track your browsing is severely hampered. Of course, equally hampered is your ability to like things and comment on posts. Are you happy making that trade-off?
2.Smartphone location services
If you have an iPhone, try this: click on settings, then privacy, then location services, system services and frequent locations. You’ll notice a list of all the cities you’re in regularly.
Click on any specific city, and you’ll find that your phone knows all the locations you frequently visit. For me, that includes my home, local tube station and office, and also the pub I play Netrunner in, the house of one of my best friends and the comics shop I frequent.
Don’t feel smug if you use Android instead: Google keeps just as copious notes on your location and, unlike Apple, it is stored in the Cloud, where it can theoretically be subpoenaed by law enforcement or accessed by a suspicious partner who happens to know your password.
How to turn it off: both companies let you turn off location histories from the same pages you can look at yours. But if you do that, they’ll get a lot worse at giving you accurate and useful location suggestions. There’s that pesky trade-off again.
3. Uber
Perhaps it’s no surprise that a company that sells you cheap cabs through a slick app keeps data on your journeys. And that data is well-used by Uber to reassure customers that their journey is safe: the company will show you your ride history as well as information about your driver which can be crucial for solving disputes or, if the worst happens, ensuring justice.
But Uber hasn’t got the best history of using that data well. The company has had to apologise before for accessing a journalist’s journey details in order to make rhetorical points, as well as remove a piece of “data journalism” looking at ride histories in aggregate to find out how many of their customers were using the service for one-night stands. They titled the post “rides of glory”.
How to turn it off: the best way would be not to use Uber. But there’s that trade-off again: old-school taxis, whether hailed from the street or called from a dispatch office, are going to end up charging you a lot more for your newly anonymous journey.
4. Mobile phone networks
Your mobile phone works by sending encrypted communications to and from masts, known as “cells”. Of course, especially in a built-up area, there’s likely to be more than one cell in range of your phone at any given time, and things would get confusing if they were all trying to run the call at the same time.
So your phone pairs with one particular cell, and “hands off” to a new one when you move around (the annoying clicks you get if you leave a phone next to an unshielded speaker is your phone checking in with a cell, to confirm it’s still alive).
If you’ve been paying attention, you’ll realise what this means: your mobile phone network has a record of where you’ve been, accurate to at least the range of the closest phone tower.
In practice, it’s probably quite a bit more accurate than that, as they can triangulate in using information from other towers in your area.
How to turn it off: stop using a mobile phone. Seriously, this one isn’t going away. If you’ve got a removable battery, you can try taking that out when you don’t want to be tracked, but whenever you turn your phone back on, your mobile phone network is going to know where you are.
5. Exif data in your pictures
Did you know that digital photographs contain information about the picture? Known as Exif data, the standard was created to hold stuff that photographers might find useful to know alongside the image, such as the focal length and aperture they used while taking it.
It’s used by professionals to embed contact information and copyright details, as well.
Of course, as with most standards, there’s been a bit of feature-creep, and these days, Exif data can contain a whole lot more information.
In fact, if you’ve taken a picture with a smartphone, or even a modern digital camera, there’s a good chance that the picture records where it was taken using the built-in GPS.
That’s great for building maps of your holidays, but not so good if you’re trading snaps with strangers.
How to turn it off: most cameras let you disable embedding location data in the files, but the good news is that social networks are one step ahead of you – and this time, they’re on your side. Facebook and Twitter both strip the metadata from images uploaded to the site, causing a headache for users who need the extra information but protecting those who don’t know that they’re uploading potentially sensitive data.
6. Facial recognition
Have you ever used Facebook’s tag suggest feature? The social network can scan through your uploaded pictures to find ones with friends who haven’t been tagged, and offer you suggestions for who to add.
It’s a wonderful time-saver over doing it the manual way, even if careless use can lead to some social faux pas (try to avoid tagging someone you don’t like just because they’re in the background of another picture).
But Facebook, and Google – which offers a similar feature – can only do that because it’s been running facial-recognition software on photos uploaded to the site for years.
In September 2012, Facebook was even forced to disable the feature after the Irish data protection commissioner scolded it for doing so without permission.