Connect with us

Experts have learned to extract data from a bare wall

Published

on

Using a video camera aimed at the wall, you can see what is happening in the room.

Surely everyone has had situations in life when they had to attend an event, where it is more fun to sit staring at the wall than to take part in it. However, for a high-definition camera, even a bare wall can be a valuable source of information about what is happening in a room. Specifically, she can determine how many people are in the room and what they are doing.

Just a month after the publication of a study by Stanford University Computational Imaging Lab experts on how to “look” through walls with a single laser beam, scientists at the Massachusetts Institute of Technology (MIT) presented their own research.

Although not always noticeable to the naked eye, in a room with even one light source, there are shadows on the walls. Some of them are moving, others are static, and still others have very distinct outlines.

Depending on the location of the light source, rendering shadows and extracting all possible information from them can be quite problematic. However, MIT specialists have learned use high-resolution video cameras that provide a high-quality image even in low light (digital noise is minimal), to shoot a sufficient amount of video from the wall and, using special processing methods, not only catch shadow movements, but also determine who creates them.

The method proposed by experts is as follows: the video camera is directed at the wall of a room with a number of people, while people do not fall into its field of view – the lens is aimed exclusively at the wall. The captured footage is then averaged – moving shadows cast by people are eliminated, while shadows from stationary objects (furniture) are preserved, creating a picture of what a lit wall in a room looks like when no one is there.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Security

Chinese TikTok adds 5-second pauses between videos to combat addictions

Published

on

5-second warning clips will remind you to “put the phone away” or “go to bed”.

Douyin, the Chinese app “twin” of TikTok, owned by the same ByteDance company, is introducing measures to combat its own algorithms, tuned to keep users’ attention as long as possible. Now those who “stick” in the application for too long will be revived by forced pauses between clips. Reported by the South China Morning Post.

On the social network, there are five-second pauses between videos that cannot be missed. During such pauses, users will be forced to watch videos reminding them of the need to “put the phone away”, “go to bed” or that “work tomorrow”. They will appear when the user spends too much time in the application.

Previously, Douyin had already limited video viewing – then the changes affected the children’s audience. Teenagers under 14 were allowed to watch videos for a maximum of 40 minutes a day, and were also banned from entering the application from 10 pm to 6 am.

Continue Reading

Security

Trump’s social network developers accused of illegal use of program code

Published

on

The Software Freedom Conservancy claims Trump Media and Technology Group copied the open source code of the decentralized social network Mastodon, created a new social network based on it.

The Software Freedom Conservancy (SFC), a not-for-profit organization that enforces the rights of open source software developers and the rules for using open licenses, accused in violation of the AGPLv3 license of the Trump social network developers Truth Social.

The Software Freedom Conservancy says that the developers of the service used the open source code of the decentralized social network Mastodon in violation of the license agreement.

Although the Mastodon code is free and free, the projects using it must comply with the terms of the Affero General Public License (or AGPLv3), among which is the mandatory availability of the project source code for all its users. Trump’s media company does not yet provide such an opportunity to TRUTH Social users and calls the social network a proprietary development.

The Software Freedom Conservancy gave Trump Media and Technology Group 30 days to improve, writes The Verge. Otherwise, the use of open source Mastodon will be prohibited for the company.

Continue Reading

Security

Facebook end-to-end encryption will give foreign intelligence services surveillance capabilities

Published

on

Former Facebook employee Frances Haugen criticized the company’s decision to transfer correspondence in its services to end-to-end encryption.

The introduction of end-to-end encryption in Facebook messengers could negatively affect the privacy of users and lead to increased surveillance by intelligence agencies. This opinion was expressed by a former employee of Mark Zuckerberg’s company, Frances Haugen, reports TASS.

According to her, after the launch of encryption in the Messenger application and the social network Instagram, which are owned by Facebook, the company will lose the ability to track possible “malicious operations of special services representatives.” “End-to-End Encryption Will Allow Facebook to Eliminate [от модерирования контента] and serve as an excuse for inaction, “Haugen said ahead of her October 25 speech in the British Parliament as part of discussions on online security bill.

The social network itself does not agree with this point of view. In their opinion, the introduction of end-to-end encryption in Facebook Messenger and Instagram applications, on the contrary, is aimed primarily at protecting the privacy of users and will protect them not only from foreign surveillance, but also from hackers.

Continue Reading

Most Popular