Archive

Posts Tagged ‘internet’

New Xbox Can See Through Your Clothes Like TSA Scanners

November 15, 2013 Leave a comment

Xbox One will be able to see your kids’ privates

Source: Adan Salazar
If the successes of its past game console launches are any indicator, sales of Microsoft’s latest effort – set to hit the market November 22 – can be expected to be strong. However, this console, which seeks to be your living room’s all-in-one home entertainment unit, is immensely different from the rest.

Above new Kinect device, below Xbox One console.

In line with the pervading surveillance culture, where microphones and cameras embedded within tablets, cell phones, laptops, light posts, vehicles and other devices watch and listen intently, Microsoft is making sure to load its gaming device with the latest spy tech goodies, which they claim will enhance users’ experiences.

But the most disturbing and worrisome Xbox One/Big Brother gossip is not that Xbox maker Microsoft was reportedly involved in the NSA PRISM scandal, or that the console’s Kinect peripheral sits listening with a multi-microphone array 24/7 for voice commands, or that its noise-isolation capabilities enable it to distinguish your voice among a crowd of your friends.

The most startling revelation is that the new Kinect device, to be sold in combination with the XBox One, at times has the ability to map out in high-definition the shape of genitalia, something fine and dandy for consenting adults, but which could be a source of consternation for parents concerned over the privacy of their kids’ junk.

Kinect image shows man’s penis / via Fast Company

The cameras aren’t exactly designed to scope out your man or womanhood; it just happens that way because the technology simply works too well, says Fast Company writer Mark Wilson.

In viewing a demo of the new Kinect from Microsoft Research, Wilson says he noticed something unmistakable that gave him cause for concern. “… I noticed, alongside the intricacies of a hoodie and jeans–and there’s no graceful way to put this–a dong.”

“The Kinect hardware/software is now so effective at deciphering the bumps and folds of clothing,” says Wilson, “that it can pinpoint a man’s package down to its pant leg, carving out the distinctive folds in our trousers that society, backed by a bit of shadowy denim, has become remarkable at ignoring.”

It was already widely known that the new Kinect’s sensors would be highly invasive, but this should add a whole new level of unease for parents who buy their kids all the latest, trendiest gadgets.

For instance, it was already known that the Kinect’s high-definition camera creates a model of your human skeleton and can track you moving about in your home, in addition to being able to monitor your heart rate in order to gauge your level of enjoyment.

And, it was already known that the Kinect will carefully study users’ eye movements and facial expressions in order to “reward” them with meaningless “virtual rewards” like avatars, in addition to creating profiles of individuals’ likes and dislikes, allowing it to serve up customized ads, services, or shows it thinks users might like.

XboxSpyThe fact that Microsoft’s already had to revamp a few Xbox One features means more people are becoming concerned with privacy. It’s had to revise the requirement of a permanent Internet connection, as well as its decision to require the Kinect, both of which were initially needed for the console to function.

As Wilson notes, allowing the new Kinect into your living room is on par with inviting one of the TSA’s millimeter wave scanners or backscatter X-ray machines into your home. But in contrast to the somewhat voluntary nature of the TSA’s prying eyes, the most unnerving thing about Kinect’s genitalia-viewing potential is that the gaming market’s target audience is primarily children and most will not know they can “opt-out.”

Nevertheless, Wilson approaches his find optimistically, saying “a small percentage of Xbox owners may ever have such an experience. This topographical view is essentially a debug mode (I believe, accessible to gamers, but far from standard), and most Kinect experiences will likely render you as a bubbly asexual cartoon or a character with stock anatomy, smoothing over everything from hoodie strings to the overzealous nipples.”

However, anxieties over Microsoft’s alleged participation in setting up backdoors for the NSA should still leave gamers and parents wary of next generation consoles’ supposed technological advancements.

BRICS Countries Build New Internet to Avoid NSA Spying

October 24, 2013 Leave a comment

Fiber optic undersea cable bypassing U.S. to be completed by 2015

Source: Paul Joseph Watson

BRICS countries are close to completing a brand new Internet backbone that would bypass the United States entirely and thereby protect both governments and citizens from NSA spying.

In light of revelations that the National Security Agency hacked German Chancellor Angela Merkel’s phone, in addition to recording information about 124 billion phone calls during a 30-day period earlier this year, the fallout against the NSA has accelerated.

Brazil is set to finalize a 34,000-kilometre undersea fiber-optic cable by 2015 that will run from Vladivostok, Russia to Fortaleza, Brazil, via Shantou, China, Chennai, India and Cape Town, South Africa.

According to the Hindu, the project will create, “a network free of US eavesdropping,” which via legislative mandates will also force the likes of Google, Facebook and Yahoo to store all data generated by BRICS nations locally, shielding it from NSA snooping.

“The BRICS countries have the muscle to pull this off,” notes Washington’s Blog. “Each of the BRICS countries are in the top 25 largest economies in the world. China has the world’s second largest economy, India is 3rd, Russia 6th, Brazil 7th, and South Africa 25th.”

However, some privacy experts fear that this will do little to stop the NSA, given that it has tapped undersea cables since the Cold War era. Others are more positive.

“Any alternative would be a positive thing, writes Michael Dorfman. “The more choice you have, the better. Yet no-one can say for sure whether this new Internet will be safer than its US counterpart and will be able to protect the rights of regular users, including the privacy of personal data and free access to resources, more effectively.”

The BRICS cable was already in development months before the revelations of whistleblower Edward Snowden first became public in June.

In September it emerged that the NSA had been spying on Brazilian government communications as well as Brazilian oil company Petrobras. Spooks hacked into the firm’s computer network to eavesdrop on conversations between CEOs.

The current Internet architecture is dominated by ICANN (the Internet Corporation for Assigned Names and Numbers), which is largely controlled by the United States.

Other entrepreneurs are also fighting back against NSA surveillance. Tech maverick John McAfee recently announced that he was to fund a $100 gadget named Decentral that would sync up with a modem to thwart NSA spying and provide total anonymity.

Asked what he would do if the US government banned the product, McAfee responded, “I’ll sell it in England, Japan, the Third World. This is coming and cannot be stopped.”

New USDA rule allows hidden feces, pus, bacteria and bleach in conventional poultry

October 1, 2013 1 comment

Source: Jonathan Benson
Natural News

rawchickenThe U.S. Department of Agriculture (USDA) is currently in the process of trying to ram through passage of a new “modernization” rule for conventional poultry production that would eliminate a large percentage of USDA inspectors and speed up the factory production process. And existing safeguards, as minimally effective as they currently are, would also be eroded, allowing for more hidden feces, pus, bacteria and chemical contaminants to persist in conventional chicken and turkey meat.

Even though salmonella rates as detected in meat and poultry have been steadily dropping year after year in the U.S., roughly the same numbers of people seem to be getting infected with the pathogen annually. The primary reason for this statistical anomaly appears to be that the current testing methods authorized by the USDA for meat and poultry are wholly inadequate and outdated and actually cover up the presence of contaminants borne on factory farms and in processing plants.

But a whole new set of guidelines being proposed by the USDA will make things even worse by allowing companies to self-inspect themselves, as well as use an even more aggressive barrage of chemicals to treat their tainted meat before selling it to consumers. This is good news for the factory poultry industry, of course, which is expected to cut its costs by about $250 million a year, thanks to its buddies at the USDA, but it’s bad news for consumers who will be subjected to all the toxic consequences.

If you have ever seen any of the shocking, undercover footage showing how chickens, turkeys and other animals are treated at factory farms, then you already know the type of filth and abuse to which these poor animals are routinely subjected. Because of their horrific living conditions, factory farm animals are often teeming with harmful pathogens, which is why their meat has to undergo chemical treatments in the first place before being packaged and served on dinner tables — it is a truly disgusting process, to say the least.

According to documented reports, after the animals are slaughtered, conventional poultry is essentially hung on long conveyor lines and sprayed, bathed and injected with all sorts of chemical solutions, including chlorine bleach, before ultimately being hauled off to the supermarket. These chemical solutions are, of course, carefully designed to kill any bacteria and render the meat “safe” for human consumption, the ultimate “don’t ask, don’t tell” policy for the factory food industry, if you will.

USDA intends to throw more chemicals, less regulation at poultry industry dilemma

But like all other chemical-based solutions that compliment industrial food production, this process is ultimately failing to subdue and kill pathogens the same way that it used to back in the old days. A cohort of new scientific research recently submitted to the USDA reveals that the routine processes by which the factory food industry covers its frightful tracks are no match to a whole new generation of “superbugs” that resist these chemicals — and the USDA’s proposed solutions only further add to the problem by covering it up with even more chemicals.

“If the new rule is implemented, all chicken will be presumed to be contaminated with feces, pus, scabs, and bile and washed in a chlorine solution,” explains ChickenJustice.org. “Consumers will eat chicken with more chemical residue and contaminants. With faster production rates, workers’ injuries will increase. They will also face breathing and skin problems from constant exposure to chlorine wash. OSHA will take the next 3 years to study the impact of the faster processing lines on workers, but USDA wants to implement the rule immediately.”

To take direct action against this heinous USDA agenda for factory chicken, you can contact the White House by visiting the ChickenJustice.org “Take Action Now!” page:

http://chickenjustice.org

Sources for this article include:

http://motherjones.com

http://articles.washingtonpost.com

http://naturalnews.com

http://chickenjustice.org

NSA’s New iPhone: Your Freedom in the Crosshairs

September 18, 2013 1 comment

Telling the truth about iPhone’s wonderful surveillance technology.
Source: Infowars.com

 

11 Million Users Abandon Facebook

September 17, 2013 Leave a comment

Users vacate Facebook over serious privacy concerns

Source: Julie Wilson
A new report by the Daily Mail reveals Facebook users are abandoning the social media giant at an unprecedented rate over privacy concerns.

Photo: Sebastien Wiertz via Flickr

Photo: Sebastien Wiertz via Flickr

New research shows Facebook has lost a total of eleven million users, nine million in the US and two million in Britain. Researchers at the University of Vienna analyzed 600 users and found they quit for the following reasons:

Privacy concerns – 48.3 percent
General dissatisfaction – 13.5 percent
Shallow conversations – 12.6 percent
Fear of becoming addicted – 6 percent

Studies show the majority of users that quit the site were older males.

Facebook, among other tech giants, have been repeatedly under scrutiny for their lack of user privacy, including turning over thousands of user’s info to the government. In August, Infowars revealed Facebook submitted information on approximately 38,000 users in 74 countries during the first half of 2013.

Over half of the requests originated from inside of the United States. Tech giants are unable to reveal absolute numbers on how many requests they’ve submitted to because the government prohibits them from doing so. However, companies like Google, Microsoft, Facebook and Yahoo have formed a unique alliance and are fighting back.

The tech alliance is putting pressure on the Foreign Intelligence Surveillance (FISA) court by filing motions asking to publicly disclose more details about secret national intelligence requests, instead of  just releasing approximations.

“We believe there is more information that the public deserves to know, and that would help foster an informed debate about whether government security programs adequately balance privacy interests when attempting to keep the public safe,” said Facebook’s general counsel Colin Stretch.

“Editor of the journal Cyberpsychology, Behaviour and Social Networking which published the findings, said: ‘Given high profile stories such as WikiLeaks and the recent NSA surveillance reports, individual citizens are becoming increasingly more wary of cyber-related privacy concerns,’” reported Mail Online.

Facebook has also been under close examination for their recently updated “Statement of Rights and Responsibilities” policy which states users’ profile data including their profile picture, name and personal information “could show up as part of a Facebook ad their friends may see on the site,” according to a report by Mashable.

Even more controversy surrounded the social media giant when they announced the update of the “Tag Suggest” feature, which would allow facial recognition technology “to speed up the process of ‘tagging’ friends and acquaintances who appear in photos posed on the network,” reported Reuters.

As you can see, users’ concerns over privacy, or lack thereof, are certainly substantiated. However, if your information isn’t being collected through Facebook, NSA’s spy program, PRISM, is sure to scoop up your info in some other way, most likely through email or cellular data.

Former NSA Director Advocates Chinese-Style Internet

September 16, 2013 Leave a comment

Hayden: “The problem I have with the Internet is that it’s anonymous”

Source: Paul Joseph Watson

During a speech at St. John’s Episcopal Church yesterday, former NSA and CIA director Michael Hayden advocated a move towards a Chinese-style world wide web where users are forced to identify themselves before posting online content.

Image: YouTube

Comparing the Internet the the wild west and Somalia, Hayden indicated that he would like to see the United States adopt a system of web policing similar to that used in Communist China, where users are mandated to submit to real name registration before they can use services like Weibo, the Chinese version of Twitter.

“The problem I have with the Internet is that it’s anonymous,” remarked Hayden.

Although the implementation of the real name registration system in China has been fraught with technical difficulties, its ultimate intention is to prevent social network users from “spreading rumors” about the ruling Communist Party, or in other words, it’s all about crushing dissent against the state.

Prominent micro-bloggers who attracted millions of followers as a result of criticizing the Chinese government are now being arrested and forced to “confess” their crimes as part of a return to a “Mao-era style of justice,” one that Michael Hayden apparently thinks America should adopt by following China’s example of banning Internet anonymity.

While defending mass NSA spying on the American public via the recently revealed PRISM program, Hayden also claimed that Gmail was the email service of choice for terrorists.

“Gmail is the preferred Internet service provider of terrorists worldwide,” he stated, presumably unaware that Gmail is merely an email service and not an ISP, adding, “I don’t think you’re going to see that in a Google commercial, but it’s free, it’s ubiquitous, so of course it is.”

In reality, as a Bloomberg report highlighted, the “(NSA) surveillance systems are best suited for gathering information on law-abiding citizens,” and not actual terrorists, who are extremely unlikely to use Gmail, Skype or iCloud.

This is by no means the first time that Michael Hayden has uttered statements about the Internet rich with controversy yet poor on facts.

Last month, Hayden compared hackers, cyberactivists and transparency groups to Al-Qaeda terrorists, labeling them, “nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings who haven’t talked to the opposite sex in five or six years.”

Domestic Surveillance Abuse Totally Out of Control

September 14, 2013 Leave a comment

The NSA isn’t just spying on suspected terrorists, it’s spying on millions of American citizens without any indication whatsoever that they are connected to terrorism. This spying is so extensive that it might include the whole population. It has also broken essentially all encryption systems so not even encrypted communications are safe from it’s prying eyes. It has been given permission to engage in this surveillance by judges who have been lied to by the agency.

Declassified documents have just been released in response to a legal action between the Electronic Frontier Foundation and the Justice Department; the San Francisco-based company brought the case to court in 2011 for records of data collection under the USA Patriot Act. The documents, from Intelligence Community Documents Regarding Collection under Section 501 of the Foreign Intelligence Surveillance Act (FISA), were made available by James R. Clapper, Director of National Intelligence, acting on the direct instructions of President Obama, and they confirm that the National Security Agency violated legal restrictions when harvesting private data from US citizens.

The new information indicates that between 2006 and 2009, the NSA authorized the daily monitoring of millions of US telephone numbers, calling patterns and IP addresses, justifying this as a necessary measure for the surveillance of foreign terror suspects. The NSA were able to obtain bulk phone records under Section 215 of the USA Patriot Act, which allows evidence from private companies to be collated if there is “reasonable, articulable suspicion” that the data they hold is associated with terrorism and should be checked against a larger database.

A total of only 2000 numbers fulfilled that legal requirement, yet up to 16,000 phone numbers were checked against databases which contained millions of records, a practice which violates US law, and evidence from two senior intelligence officials suggest that judges were lied to in order to facilitate the procedures. US District Judge Reggie Walton, who presided over secret spy courts, said that he was ‘deeply troubled’ when he discovered that records had been accessed without the necessary evidence. Another key issue was that many of the analysts privy to the information did not have the correct security clearance, meaning that they were not authorised or bound to keep the private information confidential. Only 53 analysts were actually approved by Foreign Intelligence Surveillance Court to handle sensitive data, yet the details were disseminated via email to up 189 staff.

The government state in the documents that any compliance issue occurred as a result of confusion due to the complexity of the bulk telephony metadata collection program, that all matters of non-compliance had now been resolved, and that since the incidents came to light, the ranks of the NSA’s compliance team has now swelled to a total of 300 personnel in an effort to maintain its integrity. James Clapper maintains that ‘since 2009, the Government has continued to increase its focus on compliance and oversight’, and that any subsequent compliance issues had been minor, arising due to genuine human error, and had been instantly remedied.

FACEBOOK: GOVERNMENTS DEMANDED DATA ON 38K USERS

August 27, 2013 Leave a comment

WASHINGTON (AP) – Government agents in 74 countries demanded information on about 38,000 Facebook users in the first half of this year, with about half the orders coming from authorities in the United States, the company said Tuesday.

The social-networking giant is the latest technology company to release figures on how often governments seek information about its customers. Microsoft and Google have done the same.

As with the other companies, it’s hard to discern much from Facebook’s data, besides the fact that, as users around the globe flocked to the world’s largest social network, police and intelligence agencies followed.

Facebook and Twitter have become organizing platforms for activists and, as such, have become targets for governments. During anti-government protests in Turkey in May and June, Turkish Prime Minister Recep Tayyip Erdogan called social media “the worst menace to society.”

At the time, Facebook denied it provided information about protest organizers to the Turkish government.

Data released Tuesday show authorities in Turkey submitted 96 requests covering 173 users. Facebook said it provided some information in about 45 of those cases, but there’s no information on what was turned over and why.

“We fight many of these requests, pushing back when we find legal deficiencies and narrowing the scope of overly broad or vague requests,” Colin Stretch, Facebook’s general counsel company said in a blog post. “When we are required to comply with a particular request, we frequently share only basic user information, such as name.”

Facebook and other technology companies have been criticized for helping the National Security Agency secretly collect data on customers. Federal law gives government the authority to demand data without specific warrants, and while companies can fight requests in secret court hearings, it’s an uphill battle.

Facebook turned over some data in response to about 60 percent of those requests.

It’s not clear from the Facebook data how many of the roughly 26,000 government requests on 38,000 users were for law-enforcement purposes and how many were for intelligence gathering.

Technology and government officials have said criminal investigations are far more common than national security matters as a justification for demanding information from companies.

The numbers are imprecise because the federal government forbids companies from revealing how many times they’ve been ordered to turn over information about their customers. Facebook released only a range of figures for the United States.

The company said it planned to start releasing these figures regularly.

NSA database tracks FACEBOOK chats

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from theinternet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisasurveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as theirmetadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisawarrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

KS1

 

The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSAparlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use themetadata also stored in the databases to narrow down what to review.

A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.

Email monitoring

In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

Is Your Cable Box Spying On You? Behavior-Detecting Devices From Verizon, Microsoft And Others Worry Privacy Advocates

TV

“Watching the watchers” is taking on a whole new meaning.

News that Google Inc. (NASDAQ:GOOG) may be developing a television set-top box with a motion sensor and video camera has rekindled the debate over technology that can record so-called ambient action. Should a TV-mounted box have the ability to track our movements, record our voices and monitor our behaviors? Should cable providers and tech companies be allowed to collect such information without our consent?

Lawmakers and privacy advocates are asking such questions as companies continue to experiment with data collection that will extend beyond our gadgets and into our living rooms and bedrooms. On Thursday, theWall Street Journal reported that Google privately showed off a prototype device at the Consumer Electronics Show in Las Vegas last January. The company is one of many tech players looking to compete with pay-TV providers, who themselves have been exploring new ways to capture information about viewers’ behavior.

In November, Verizon Communications Inc. (NYSE:VZ) filed a patent application for a set-top box that delivers advertisements based on users’ behaviors. For instance, two people cuddling on sofa watching TV might see a commercial for a romantic Disney cruise, while an arguing couple might see a pitch for couples’ therapy. The device would use a combination of motion and audio sensors to collect information about what viewers are doing as they watch TV.

Creeped out yet? You’re not alone. News of Verizon’s plans brought countless headlines about the potential for Orwellian cable boxes and digital video recorders, spying on us during our most intimate moments. And legislators have been quick to respond. Last month, two U.S. congressmen, a Democrat and a Republican,introduced a bill that would require such devices to be opt-in, meaning consumers would have to grant explicit consent before companies could collect data on ambient action. The bill — dubbed the “We Are Watching You Act of 2013” — would also require that devices flash on-screen warnings whenever they are recording such information.

Reps. Michael E. Capuano, D-Mass., and Walter Jones, R-N.C., who sponsored the bill, called such technology an “invasion of privacy.” In a statement, Jones even acknowledged the data collected through such devices could be potentially abused by the government itself. “When the government has an unfortunate history of secretly collecting private citizens’ information from technology providers, we must ensure that safeguards are in place to protect Americans’ rights,” he said.

The extent to which Google’s set-top box would collect ambient information is unclear. In its report, the Journal cited only “people briefed on the device,” and a Google representative has not yet responded to a request for more information. However, the company has reportedly been experimenting with such technology for several years. As Gizmodo reported in 2007, Google filed for a patent for an interactive TV that would include an image-capture device capable of measuring “how many viewers are watching or listening to a broadcast.”

And Google and Verizon are by no means lone players. In November, the Microsoft Corp. (NASDAQ:MSFT) also filed a patent application for a system that would use its Kinect camera to monitor users’ behavior. Kinect will come attached to Microsoft’s forthcoming Xbox One game consoles. Its always-on sensors can read body behavior, track eye movements and listen for commands. It even knows how many people are in the room. As Polygon reported, the device has raised numerous concerns among privacy advocates, particularly in light of Microsoft’s reported compliance with the National Security Agency’s PRISM program.

If it makes you feel any better, Microsoft has vowed to “aggressively challenge” any government attempt to spy on its customers using Kinect sensors. “Absent a new law, we don’t believe the government has the legal authority to compel us or any other company that makes products with cameras and microphones to start collecting voice and video data,” a company representative told the Verge this month.

Follow

Get every new post delivered to your Inbox.

Join 40,174 other followers