Posts Tagged ‘privacy’

Is Genetic Privacy a Myth?

October 28, 2017

But it’s the very specificity of genomic data that threatens privacy. Although most genomic databases strip away any information linking a name to a genome, such information is very hard to keep anonymous. “I’m not convinced you can truly de-identify the data,” says Mark Gerstein, a Yale professor who studies large genetic databases and is a fierce privacy advocate. He is concerned about whether even the most cutting-edge protections can safeguard personal data. “I am not a believer that large-scale technical solutions or ‘super-encryption’ will solely work,” he says. “There also needs to be a process for credentialing the individuals who access this data.”

Threats to privacy could multiply once there is an active market for genetic data. Wood speculates that it could be valuable to life insurance companies, which could use it to raise your premiums; or it could become a tool for those who want to prove or disprove paternity. White nationalist groups, who have become preoccupied with genetic testing, might find a way to weaponize the ancestry data the tests can show. It would not be the first time genetic information was used against a race or races. “Genetics has a very troubled history, from Darwin on,” says Yale’s Mark Gerstein.

Yet Columbia’s Yaniv Erlich and others, including Church, fear differential privacy could compromise biomedical research, with smudged data making it harder to get clear results. Mark Gerstein at Yale believes that scientists would be better off testing hypotheses on small amounts of publicly available but pure data, even if it’s not representative of the overall population, rather than using larger quantities of imperfect data.

Is Genetic Privacy a Myth?
Genetic tests and genome sequencing are generating terabytes of sensitive private data. How can they be kept safe?

German activities on RNA privacy

October 21, 2017

Identifying Personal DNA Methylation Profiles by Genotype Inference

Michael Backes⇤, Pascal Berrang⇤, Matthias Bieg†, Roland Eils†‡, Carl Herrmann†‡, Mathias Humbert⇤, Irina Lehmann§

Re-Identification of Individuals in Genomic Data-Sharing Beacons via Allele Inference | bioRxiv

October 21, 2017
higher order markov to predict snps

Backed into a corner, Uber allows users to opt out of ‘always on’ location tracking – The Verge

September 25, 2017

Artificial intelligence just made guessing your password a whole lot easier

September 22, 2017

#AI just made guessing your password…easier rather Number cracked raises #security/#privacy concerns HT @Rozowsky

The new study aimed to speed this up by applying deep learning, a brain-inspired approach at the cutting edge of AI. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter.

We’re committed to your security

September 17, 2017

As you may have heard, Equifax, one of the three largest credit monitoring bureaus in the U.S., announced a data breach at the company that may have affected 143 million U.S. consumers. The breach included social security numbers, birth dates, addresses, credit card numbers as well as other personal information.

Sampling DNA From a 1,000-Year-Old Illuminated Manuscript

September 16, 2017

Sampling DNA From a 1K-Year-Old…Manuscript As reported from a unsubmitted preprint. Pot. #privacy implications

Remarkably, the authors say they extracted all this DNA without destroying even a tiny piece of parchment. All they needed were the crumbs from rubbing the book with erasers, which conservationists routinely use to clean manuscripts. The authors report their findings in a preprint that has not yet been peer-reviewed, though they plan to submit it to a scientific journal.”

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency

September 5, 2017

Identity Thieves Hijack Cellphone Accounts to Go After Virtual
Currency Problematic #privacy loophole w/ #2factor

“Hackers have discovered that one of the most central elements of online security — the mobile phone number — is also one of the easiest to steal.
In a growing number of online attacks, hackers have been calling up Verizon, T-Mobile U.S., Sprint and AT&T and asking them to transfer control of a victim’s phone number to a device under the control of the hackers.

Julian Assange, a Man Without a Country

September 3, 2017

.@JulianAssange, man w/o a country Eisenhower: “If you can’t solve a problem, enlarge it.” Now applied to @WikiLeaks

Dwight Eisenhower is said to have once declared, “If you can’t solve a problem, enlarge it.” Assange had taken a personal legal crisis and blown it up into an international incident: he had teleported himself from the mundane into the tragic realm. A number of WikiLeaks volunteers urged him to step down until

There have been calls for his assassination, and for him to be given a Nobel Peace Prize. Assange often describes himself in simple terms—as a fearless activist—but his character is complicated…

A Data Broker Offers a Peek Behind the Curtain –

August 27, 2017

A Data Broker Offers a Peek Behind the Curtain: site listing what’s compiled about you MT @robert_schiff #privacy

site =