Connect with us

Tech

Twitter kills 143,000 apps, charts new rules for developers

Published

on

TWITTER

San Francisco, July 25 : Twitter removed more than 143,000 apps between April and June which violated its policies, the company has announced, saying it is further investing in building improved tools and processes to stop malicious apps faster.

As part of its clean-up process, the micro-blogging platform also introduced a new way for all developers to request access to Twitter’s application programming interfaces (APIs)

“These changes enable us to have more visibility and control over how developers use our platform and public data from the people using our service,” wrote Yoel Roth and Rob Johnson from Twitter in a blog post late on Tuesday.

According to media reports, Twitter suspended more than 70 million fake accounts in May and June in a massive drive to clear out bots and trolls on the platform. Twitter currently has nearly 330 million monthly active users (MAUs).

The company also announced a new developer account application process that include use case reviews and policy compliance checks, as well as new protections to prevent the registration of spammy and low-quality apps.

“Starting today, all new requests for access to Twitter’s standard and premium APIs are required to go through this process,” Twitter said.

Following application approval, the developers may be required to undergo additional rigorous policy reviews if they change app’s use or request access to additional features, “including the ability to post content to Twitter frequently or at high volumes”.

“We’re also limiting the default number of apps you may have registered by a single developer account to 10. Developers who need to register more than 10 apps can request permission using the API Policy support form,” Twitter informed.

“If you already have more than 10 apps registered, you can continue to use them as long as they comply with our rules but you won’t be able to register new apps until you either request permission for additional apps or delete unused ones,” it added.

On September 10, Twitter will add new default app-level rate limits that will apply to all requests to create tweets, retweets, likes, follows, or Direct Messages.

By default, an app (across all of its users) will be limited to 300 tweets and retweets (combined) per three hours; 1,000 likes per 24 hours; 1,000 follows per 24 hours and 15,000 Direct Messages per 24 hours.

Twitter also introduced a new option for people to report suspected violations of its platform policies.

“You can use the ‘Report a bad app’ option in our Help Centre to report uses of our APIs which produce spam, invade user privacy, or otherwise violate our rules,” Twitter noted.

IANS

Tech

Is Alexa recording your bedroom talk?

Published

on

amazon alexa
Photo Credit- (Ramegowda Bopaiah/Mint)

New Delhi, Feb 19: At a time when digital assistants in smart devices at home or office are talking to us like never before, some users have begun to worry: Is Alexa or Google Home listening and recording personal conversations beyond the “wake” word?

There are multiple triggers to such concerns, the latest one being a person in Germany using Amazon’s voice assistant who received 1,700 audio files from a person he never met.

A woman in the US state of Oregon was in shock last year when the Amazon Echo device at her Portland home recorded a private conversation and then shared it with one of her husband’s employees in Seattle.

Amazon later clarified that Alexa mistakenly heard a series of commands and sent the recording as a voice message to one of the husband’s employees.

The threat is very much real, with more and more Indians being hooked to the always-on and Internet-connected smart home devices.

In a latest Forrester report titled “Secure The Rise Of Intelligent Agents”, Amy DeMartine and Jennifer Wise argue that currently, introductory versions of intelligent agents include Alexa, Cortana, Google Assistant and Siri. However, security is not part of the equation, and unless security pros get involved, the implications are more worrisome for businesses than normal human beings.

“Alexa doesn’t currently authenticate or authorise individuals who access it, leaving a company’s Alexa skills unprotected from anyone who can remember another user’s commands,” reads the report.

“A hacker has already developed a method to install malware on a pre-2017 Amazon Echo that streams the microphone to any remote computer, accesses the owner’s Amazon account, and installs ransomware,” the Forrester report added.

Apple logs and stores Siri queries but they are not associated with an Apple ID or email address, and the company deletes the association between queries and their numerical codes after six months.

Amazon and Google devices, however, save query histories until the customer deletes them, and Microsoft Cortana users must manage their own data retention preferences in the Cloud and on their devices.

According to Puneesh Kumar, Country Manager for Alexa Experiences and Devices, Amazon India, the threat of Alexa recording all your conversations is not real as the company has created layers of privacy protections in all of its Echo device.

“It includes a mute button involving a hardware press that electrically disconnects the microphones and cameras, clear visual indicators when utterances are being captured and streamed, as well as the ability to see and delete voice recording history for their devices,” Kumar told IANS.

Echo speakers use on-device keyword spotting to detect the “wake” word and only the “wake” word. When the “wake” word is detected, the light ring around the top of the device turns blue to indicate that Alexa is streaming audio to the Cloud.

“At any time, you can turn the microphone off by pushing the microphone button on the top of the device and this creates an electrical disconnect to the mic, which will turn on a red ring to visually indicate that the device is muted,” informed Kumar.

According to Amazon, the voice utterances spoken to the device may be used in order to deliver and improve its services.

The users, if needed, can delete specific voice recordings associated with their accounts by going to History in Settings in the Alexa App, drilling down for a specific entry, and then tapping the delete button. You can also delete all voice recordings associated with your account for each of your Alexa-enabled products.

IANS

Continue Reading

Tech

Can begin 5G trial within a month of Indian govt’s approval: Huawei

Published

on

huawei

New Delhi, Feb 19: Amid reports speculating that Huawei may not get the government’s approval for 5G trial in India, CEO Jay Chen on Tuesday said the Chinese tech major can start 5G trial within a month of nod from the government.

“All of my engagements with the government have been positive so far. We are fully prepared. We can start the 5G trial within one month of getting approval from the Department of Telecommunications (DoT),” Chen told news agency IANS on the sidelines of a media workshop on 5G in the national capital.

Chen further stated “We are in talks with all the major telecom operators in India including Bharti Airtel, Reliance Jio and the state-run BSNL for 5G roll-out in India”.

Huawei is leading the 5G race globally with its huge investments in R&D but the tech giant is witnessing the heat from some Western countries, especially the US which alleges that Huawei 5G network could pose a national security threat.

Refuting the allegations as mere “politics”, Chen said that no country has been able to give any proof of wrongdoing on Huawei’s part.

“It would not be logical to exclude Huawei from the 5G trial in India as it would mean losing the benefits of innovative technologies that we can bring to the 5G ecosystem in the country,” Chen pointed.

WeForNews

Continue Reading

Tech

Facebook accused of leaking sensitive health data of users

Published

on

facebook

San Francisco, Feb 19: Social networking giant Facebook has been accused of revealing sensitive health data of users in its groups.

“Facebook has marketed this product as a Personal Health Record and it then leaked the health data that those patients uploaded to the public,” a complaint filed with the Federal Trade Commission (FTC) noted on Monday.

According to the Verge report, the issue was first noticed in July, when members of a women’s group with a gene mutation discovered how easily the names and email addresses of members could have been downloaded in bulk, either manually or through a Chrome extension.

During that time, Facebook reportedly claimed to have made changes to “Groups” that stopped the practice and emphasised on the option for join “Secret Groups” – that are, although difficult to join, but have a more limited discoverability.

However, the complaint pointed that public sharing of privately posted personal health information is in violation of the law, which is a major problem with Facebook’s privacy implementation methods.

The complaint further added “Facebook has ignored our requests to fix the specific issues we have identified to the company, and denies publicly that any problem exists. All of this represents unfair, deceptive and misleading interactions between Facebook and its users in violation of the FTC act”.

WeForNews

Continue Reading
Advertisement

Most Popular