Internet is already full of digital images and more is added every day. Digital pictures have become a cheap way for journalists to tell a story and ordinary people upload tons of them to social media. It’s quicker and easier to snap a shot and upload than to describe where you are and what the place looks like.
Photographs have always been seen as some kind of proof. Like a captured piece of reality. We are however aware of the fact that photographs can be manipulated. Digital image processing has revolutionized this area and brought amazing new techniques to us. But image manipulation has actually been a known technique since photography was invented. It is amazing to see what a skilled person can do to traditional images in the darkroom. Not to mention the fact that you can lie a lot just by taking the picture in a certain way.
This article is about our relationship to the digital images on the net. There’s a lot of manipulated pictures out there, but are you able to recognize a fake? And are you even alert and aware that the picture may not be the full truth? We are all confronted with many pictures a day that aren’t completely real. Objects may be added or removed, or heavy retouching has been used to make models look better. Here’s some concrete hints about how to tell the fakes from the real ones.
That’s a quick list of things that help you spot the fakes. Using these hints require some training, but you will soon start seeing the manipulations if you keep them in mind when looking at images. But is it possible to make a perfect fake that is undetectable? Yes, especially if a skilled artist can work on a high resolution image and the result is scaled down to be published on the web. That down-sampling can hide the signs of manipulation effectively and make the fake practically undetectable for laymen. Scientific analysis methods are more capable, but they are not available to us mortals. And they may also fail to detect good fakes.
So the moral of the story is really that a photo shouldn’t be trusted too much unless its background is known and we know what ethical principles the photographer and publisher adhere to. News agencies typically pay attention to this and promise us authentic news pictures. These pictures are typically trustworthy, even if scandals do occur.
PS. This funny video is one of my favorites on YouTube.
See that floppy disc? That's how F-Secure Labs used to get malware to analyze. Nowadays, of course, it's much different, Andy Patel from the Labs explained in a recent post, "What's The Deal with Scanning Engines?" In just a few hundred words, Andy lays out what makes modern protection so different from the anti-virus that you remember from the 80s, 90s or even the early 00s. And it's not just that floppy disks the Labs once analyzed have been replaced by almost any sort of digital input, down to a piece of memory or a network stream. The whole post is worth checking out if you're interested in how relentless modern internet security must be to keep up with the panoply of online threats we face. But here's a quick look at five of the key components of endpoint protection that work in tandem to stop attacks in their tracks, as described by Andy: Scanning engines. Today’s detections are really just complex computer programs, designed to perform intricate sample analysis directly on the client. Modern detections are designed to catch thousands, or even hundreds of thousands of samples. URL blocking. Preventing a user from being exposed to a site hosting an exploit kit or other malicious content negates the need for any further protection measures. We do this largely via URL and IP reputation cloud queries. Spam blocking and email filtering also happen here. Exploit detection. If a user does manage to visit a site hosting an exploit kit, and that user is running vulnerable software, any attempt to exploit that vulnerable software will be blocked by our behavioral monitoring engine. Network and on-access scanning. If a user receives a malicious file via email or download, it will be scanned on the network or when it is written to disk. If the file is found to be malicious, it will be removed from the user’s system. Behavioral blocking. Assuming no file-based detection existed for the object, the user may then go on to open or execute the document, script, or program. At this point, malicious behavior will be blocked by our behavioral engine and again, the file will be removed. The fact is, a majority of malware delivery mechanisms are easily blocked behaviorally. In most cases, when we find new threats, we also discover that we had, in the distant past, already added logic addressing the mechanisms it uses.If you're interested in knowing more about behavioral engines, check out this post in which Andy makes then easy to understand by comparing the technology to securing an office building. So you must be wondering, does this all work? Is it enough? Well, our experts and our computers are always learning. But in all the tests this year run by independent analysts AV-Comparatives, we’ve blocked 100% of the real-world threats thrown at us. Cheers, Jason
Allegations that Facebook "suppressed" conservative news, first reported by Gizmodo, quickly snowballed into broader charges that Facebook "censors" viewpoints its employees doesn't like. Facebook is the first access point to the internet for hundreds of millions if not a billion people around the world. And for millennials in the U.S., it is their primary source for political news. Some have suggested that the site could actually tilt the 2016 U.S. presidential election. Hence Facebook takes these allegations and the damage they've done to Facebook's image among conservatives seriously. Users will never be able to control the "Trending" section of the site, which Facebook insists is handled objectively as possible through curators (and, apparently, a lot of help from Google). But you do have some control over your news feed, which is generated by Facebook's algorithm "Edgerank." There are things you can do to influence your feed in hopes of seeing a diverse flow of information that doesn't simply confirm your biases. Here are 5: Get rid of the noise. Go to https://www.facebook.com/friends/organize and add the people you want to get less news from to your "acquaintances" list. You'll see their posts a lot less often and -- best of all -- they'll have no idea you've demoted them. Let Facebook do less of the picking for you. On the left column of your home page, under Favorites, next to News Feed click the arrow and select "Most Recent". This won't turn off Facebook's algorithm completely, but it will make it more likely you'll see a diversity of sources in your feed. Trust someone. Find a few people you respect who have a different political leanings than you and ask them for one Facebook page to follow. Just one? That's enough. Once you like the page, Facebook will help from there by suggesting a few pages with similar leanings. Of course, you're relying on Facebook's recommendations. But if you don't trust Facebook at all, this would be a good time to delete your account. Prioritize the new blood. Click on the down arrow in the upper right corner of any Facebook page and select "News Feed Preferences" and then select "Prioritize who to see first" and then on the dropdown menu select "Pages only." Now click on those new pages you just added to your stream -- along with the other valuable news sources you think help keep you informed. 5. Teach Facebook what you like. When you see something you like, click on it, comment on it, interact with it. Facebook exists to keep you in Facebook and will reward your clicks with similar content. And if you get a post you don't like, you can tell Facebook by clicking on that subtle little down arrow, which will show you this: Yes, you're sort of "censoring" your feed. But at least it's you doing it. Cheers, Jason [Image by Turinboy | Flickr]
It’s going to be a busy month for sports lovers from all corners of the world. Hockey fans are currently being treated to both the NHL playoffs and the IIHF world cup, and the coming month will see things like the Champions League final, the US Masters, the NBA playoffs, and to top it all off, the European Championships in football. This presents a problem for many of us. Particularly during the summer, we travel a lot and just might be unable to find a TV screen showing our favorite events. So does this mean we have to miss Kevin Durant sink yet another 3-pointer or be content with next-day highlights of the CL final between Real and Atletico? Thankfully not! The internet allows us to stream games online and watch your favorite matches anywhere, whether at home or under a beach umbrella. Unfortunately, your excitement can often be hindered by messages like “Sorry, this content is unavailable in your country.” This is known as geo-blocking, where the services check your IP address (the unique address of your device) and only allow access if it is located in a specific country. The obvious solution then is to change your IP address to a country where you can access the service. And the easiest and quickest way to do this is with a VPN. How Freedome VPN works The way VPNs work is very simple. Instead of connecting to the internet directly, a VPN first directs your traffic into a secure and private tunnel. The rest of the web won’t see where your traffic enters the tunnel, making your real location and IP address hidden. A VPN like Freedome also lets you choose where the other end of that tunnel is, and THIS determines where any website will think you are. Pretending to be virtually in another country is that simple! How to use Freedome VPN to stream sports Follow these simple instructions to watch your favorite sports live everywhere! Download and install Freedome VPN In the Freedome app, tap the location at the bottom of the screen, and choose your home country where the stream you want to see is available Navigate to the website of the streaming service or search for a legal live stream of the sports event online If on a mobile device, remember to turn “location” off, as some websites use this as an additional method of pinpointing your location It’s as simple as that! More about Freedome VPN Freedome is a hybrid VPN, available for both mobile and desktop platforms. In addition to letting users access content restricted to other countries, it protects your anonymity from websites you visit, and prevents even your internet service provider from snooping on your online activities. There are even a few features lacking in other VPN products, such as automatic blocking of intrusive tracking by advertisers, and protection from malicious websites. Get Freedome from our website to enjoy unrestricted access to the internet while protecting your privacy on the side!