Posts Tagged ‘privacy’

differential privacy

November 29, 2017


Box 1 of the following paper has a nice definition for differential privacy in genomics sense (phenotypic differential privacy): http://www.cell.com/cell-systems/fulltext/S2405-4712(16)30121-1 “

Five Best File Encryption Tools

November 26, 2017

GNU Privacy Guard v VeraCrypt – use w/ dropbox ? ease of install ?

QT:{{”
“VeraCrypt (Windows/OS X/Linux)

VeraCrypt is a fork of and a successor to TrueCrypt, which ceased development last year (more on them later.) The development team claims they’ve addressed some of the issues that were raised during TrueCrypt’s initial security audit, and like the original, it’s free, with versions available for Windows, OS X, and Linux. If you’re looking for a file encryption tool that works like and reminds you of TrueCrypt but isn’t exactly TrueCrypt, this is it. VeraCrypt supports AES (the most commonly used), TwoFish, and Serpent encryption ciphers, supports the creation of hidden, encrypted volumes within other volumes. Its code is available to review, although it’s not strictly open source (because so much of its codebase came from TrueCrypt.) The tool is also under constant development, with regular security updates and an independent audit in the planning stages (according to the developers.)”

“}}

Is Genetic Privacy a Myth?

October 28, 2017

QT:{{”
But it’s the very specificity of genomic data that threatens privacy. Although most genomic databases strip away any information linking a name to a genome, such information is very hard to keep anonymous. “I’m not convinced you can truly de-identify the data,” says Mark Gerstein, a Yale professor who studies large genetic databases and is a fierce privacy advocate. He is concerned about whether even the most cutting-edge protections can safeguard personal data. “I am not a believer that large-scale technical solutions or ‘super-encryption’ will solely work,” he says. “There also needs to be a process for credentialing the individuals who access this data.”

Threats to privacy could multiply once there is an active market for genetic data. Wood speculates that it could be valuable to life insurance companies, which could use it to raise your premiums; or it could become a tool for those who want to prove or disprove paternity. White nationalist groups, who have become preoccupied with genetic testing, might find a way to weaponize the ancestry data the tests can show. It would not be the first time genetic information was used against a race or races. “Genetics has a very troubled history, from Darwin on,” says Yale’s Mark Gerstein.

Yet Columbia’s Yaniv Erlich and others, including Church, fear differential privacy could compromise biomedical research, with smudged data making it harder to get clear results. Mark Gerstein at Yale believes that scientists would be better off testing hypotheses on small amounts of publicly available but pure data, even if it’s not representative of the overall population, rather than using larger quantities of imperfect data.
“}}

Is Genetic Privacy a Myth?
http://protomag.com/articles/genetic-privacy-myth
Genetic tests and genome sequencing are generating terabytes of sensitive private data. How can they be kept safe?

German activities on RNA privacy

October 21, 2017

http://www.mhumbert.com/publications/oakland17.pdf

Identifying Personal DNA Methylation Profiles by Genotype Inference

Michael Backes⇤, Pascal Berrang⇤, Matthias Bieg†, Roland Eils†‡, Carl Herrmann†‡, Mathias Humbert⇤, Irina Lehmann§

Re-Identification of Individuals in Genomic Data-Sharing Beacons via Allele Inference | bioRxiv

October 21, 2017

https://www.biorxiv.org/content/early/2017/10/09/200147
higher order markov to predict snps

Backed into a corner, Uber allows users to opt out of ‘always on’ location tracking – The Verge

September 25, 2017

https://www.theverge.com/2017/9/21/16343304/uber-location-tracking-opt-out-apple-ios11

Artificial intelligence just made guessing your password a whole lot easier

September 22, 2017

#AI just made guessing your password…easier
http://www.ScienceMag.org/news/2017/09/artificial-intelligence-just-made-guessing-your-password-whole-lot-easier rather Number cracked raises #security/#privacy concerns HT @Rozowsky

QT:{{”
The new study aimed to speed this up by applying deep learning, a brain-inspired approach at the cutting edge of AI. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter.
“}}

We’re committed to your security

September 17, 2017

http://links.e.lastpass.com/ctt?kn=1&ms=NTQ4ODM4MTcS1&r=MTk4NDYzMjg3MDcwS0&b=0&j=MTI0NDc3NjcwMwS2&mt=1&rt=0

https://www.equifaxsecurity2017.com/

QT:{{”
As you may have heard, Equifax, one of the three largest credit monitoring bureaus in the U.S., announced a data breach at the company that may have affected 143 million U.S. consumers. The breach included social security numbers, birth dates, addresses, credit card numbers as well as other personal information.
“}}

Sampling DNA From a 1,000-Year-Old Illuminated Manuscript

September 16, 2017

Sampling DNA From a 1K-Year-Old…Manuscript
https://www.theAtlantic.com/science/archive/2017/08/the-secret-life-of-illuminated-manuscripts-as-told-in-dna/536172/ As reported from a unsubmitted preprint. Pot. #privacy implications

QT:{{”
Remarkably, the authors say they extracted all this DNA without destroying even a tiny piece of parchment. All they needed were the crumbs from rubbing the book with erasers, which conservationists routinely use to clean manuscripts. The authors report their findings in a preprint that has not yet been peer-reviewed, though they plan to submit it to a scientific journal.”
“}}

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency

September 5, 2017

Identity Thieves Hijack Cellphone Accounts to Go After Virtual
Currency https://www.nytimes.com/2017/08/21/business/dealbook/phone-hack-bitcoin-virtual-currency.html Problematic #privacy loophole w/ #2factor

QT::{{”
“Hackers have discovered that one of the most central elements of online security — the mobile phone number — is also one of the easiest to steal.
In a growing number of online attacks, hackers have been calling up Verizon, T-Mobile U.S., Sprint and AT&T and asking them to transfer control of a victim’s phone number to a device under the control of the hackers.
“}}