rhatto: smartphone*

85 bookmark(s) - Ordenar por: Data ↓ / Título / Voting / - Bookmarks from other users for this tag

  1. -
    https://puri.sm/shop/librem-5
    Voting 0
  2. -
    https://www.wired.com/story/our-minds...s-wants-to-rescue-them/?src=longreads
    Tags: , , by rhatto (2017-08-20) | Cache | PDF | PNG
    Voting 0
  3. -
    https://www.brasil247.com/pt/saude247...sequestram-a-capacidade-cognitiva.htm
    Tags: , , by rhatto (2017-08-09) | Cache | PDF | PNG
    Voting 0
  4. -
    https://www.indiegogo.com/projects/pr...ecure-smartphone-security-technology#
    Voting 0
  5. GABINETE DE SEGURANÇA INSTITUCIONAL PORTARIA No - 85, DE 26 DE JUNHO DE 2017

    Estabelece regras básicas de utilização do Terminal de Comunicação Segura (TCS) fornecido pela Agência Brasileira de Inteligência (ABIN).

    O MINISTRO DE ESTADO CHEFE DO GABINETE DE SEGURANÇA INSTITUCIONAL DA PRESIDÊNCIA DA REPÚBLICA , no uso das atribuições que lhe são conferidas pelo art. 87, parágrafo único, inciso II, da Constituição, e no inciso IV do art. 10 da Medida Provisória nº 782, de 31 de maio de 2017, resolve:

    Art. 1º Estabelecer regras básicas de uso do Terminal de Comunicação Segura (TCS) de propriedade da União, fornecido pela Agência Brasileira de Inteligência (ABIN). Parágrafo único. O TCS é um dispositivo composto por um aparelho de telefonia celular que incorpora sistema operacional e aplicação cliente-servidor customizados, e por uma plataforma crip- tográfica que implementa algoritmo criptográfico de Estado.

    Art. 2º O TCS destina-se ao uso exclusivo do trato de as- suntos de interesse do serviço público e do Estado, sendo de uso pessoal e exclusivo do agente público que possui a sua guarda, nos termos desta Portaria.

    Art. 3º O TCS poderá ser concedido a agente público, do- ravante denominado portador, que tenha necessidade de utilização de comunicação segura.

    § 1º As solicitações de fornecimento de TCS deverão ser dirigidas ao Ministro de Estado Chefe do Gabinete de Segurança Institucional da Presidência da República, por meio de Aviso, com a exposição de motivos para a necessidade de uso.

    § 2º A ABIN será instada pelo Ministro de Estado Chefe do Gabinete de Segurança Institucional sobre a disponibilidade de aten- dimento das solicitações de TCS.

    § 3º O TCS não será fornecido com linha telefônica celular aos portadores.

    Art. 4º O TCS é de uso exclusivo do seu portador, não podendo ser cedido a terceiros, sendo atribuído ao responsável o ônus sobre danos causados por uso inadequado.

    Art. 5º No ato do recebimento do TCS, bem como dos respectivos acessórios, o usuário deverá assinar formulário da ABIN denominado "Termo de Responsabilidade e Custódia".

    Art. 6º É vedado ao portador do TCS:

    I - instalar quaisquer aplicativos sem autorização prévia da ABIN;

    II - copiar, modificar ou alterar aplicações e códigos pre- viamente instalados no dispositivo; e

    III - fazer ou permitir a realização de engenharia reversa em qualquer componente do dispositivo.

    Art. 7º Em caso de falha de funcionamento no TCS, o portador deverá restituir o aparelho à ABIN imediatamente, para substituição.

    Art. 8º O TCS e seus respectivos acessórios são objetos de controle patrimonial da ABIN, ficando o portador no ato do re- cebimento ou da instalação com a responsabilidade pelo uso e pela guarda, cabendo-lhe indenizar a União em caso de uso indevido, furto, roubo, extravio ou eventual dano, após apuração, conforme dispuser a legislação pertinente.

    Art. 9º Nos casos de furto, roubo ou extravio do TCS, cabe ao portador:

    I - solicitar, imediatamente, à ABIN, o bloqueio do TCS;

    II - registrar a ocorrência policial no prazo máximo de 24 (vinte e quatro) horas;

    III - comunicar formalmente o fato à ABIN para que sejam adotadas, se for o caso, as providências relacionadas à apuração de responsabilidade, na forma da legislação pertinente. Parágrafo único. Em viagem internacional, o registro deverá ser feito junto à autoridade local competente.

    Art. 10. Tão logo tenha cessado a necessidade de uso, o portador do TCS deverá restituir o aparelho e seus respectivos aces- sórios à ABIN, no prazo de 48 (quarenta e oito) horas, para baixa de sua responsabilidade.

    Art. 11. Cabe à ABIN verificar as condições de uso e de conservação do TCS e registrar eventual ocorrência por ocasião da sua devolução, tomando as providências cabíveis, quando for o caso. Art. 12. A ABIN, sob demanda do Ministro de Estado Chefe do Gabinete de Segurança Institucional, pode bloquear ou suspender o uso da correspondente aplicação que está instalada no TCS.

    Art. 13. O TCS, por se tratar de um dispositivo que contém algoritmo criptográfico de Estado, está sujeito aos controles da le- gislação pertinente sobre criptografia de Estado.

    Art. 14. Os casos omissos serão resolvidos pelo Ministro de Estado Chefe do Gabinete de Segurança Institucional da Presidência da República.

    Art. 15. Esta Portaria entra em vigor na data de sua publicação.

    SÉRGIO WESTPHALEN ETCHEGOYEN
    http://pesquisa.in.gov.br/imprensa/js...7&jornal=1&pagina=7&totalArquivos=192
    Voting 0
  6. Whether it was designed in studios in Cupertino, Seoul or somewhere else, it is highly probable that the smartphone in your hand was assembled and prepared for shipment and sale at facilities within a few dozen kilometers of Shenzhen city, in the gritty conurbation that has sprawled across the Pearl River Delta since the Chinese government opened the Shenzhen Special Economic Zone for business in August 1980. These factories operate under circumstances that are troubling at best. Hours are long; the work is numbingly repetitive, produces injuries at surreal rates, and often involves exposure to toxic chemicals. Wages are low and suicide rates among the workforce are distressingly high. The low cost of Chinese labor, coupled to workers’ relative lack of ability to contest these conditions, is critical to the industry’s ability to assemble the components called for in each model’s bill of materials, apply a healthy markup and still bring it to market at an acceptable price point. Should Chinese wages begin to approximate Western norms, or local labor win for itself anything in the way of real collective bargaining power, we may be certain that manufacturers will find other, more congenial places to assemble their devices. But for now Shenzhen remains far and away the preeminent global site of smartphone manufacture.

    Take a step or two further back in the production process, and the picture gets bleaker still. To function at all, the smartphone—like all electronic devices—requires raw materials that have been wrested from the Earth by ruthlessly extractive industries. The cobalt in its lithium-ion batteries was mined by hand in the Congo, often by children; the tin in the soldered seams that bind it together most likely comes from the Indonesian island of Bangka, where the water table is irreparably fouled, 70 percent of the coral reefs have been destroyed by mine runoff, and on average one miner a week is killed on the job. The damage caused by the processes of extraction fans out across most of a hemisphere, mutilating lives, human communities and natural ecosystems beyond ready numbering. And so the polluted streams, stillborn children and diagnoses of cancer, too, become part of the way in which the smartphone has transformed everyday life, at least for some of us.

    Though these facts might give us pause in just about any other context, we don’t appear to be too troubled by them when it comes to the smartphone. The smartphone isn’t like any other product, and in fact ranks among the most rapidly adopted technologies in human history. And so we suppress whatever qualms we may have about the conditions in the mines and factories, the environmental footprint, the energetic cost of the extended supply chain, or the authoritarian governments we ultimately support through our act of purchase. To the degree that we’re even aware of it, we leave this deniable prehistory behind the moment we plunk down our cash and take home our new phone.

    ... »

    There’s something of an ethical bind here, because if the smartphone is becoming a de facto necessity, it is at the same time impossible to use the device as intended without, in turn, surrendering data to it and the network beyond. In part, this is simply a function of the way mobile telephony works. Most of us know by now that our phones are constantly tracking our location, and in fact have to do so in order to function on the network at all: the same transaction with a cellular base station or WiFi router that establishes connectivity suffices to generate at least a low-resolution map of our whereabouts. But it is also a function of business model.

    ... »

    Whenever we locate ourselves in this way, whether we’re quite aware of it or not, we are straightforwardly trading our privacy for convenience. For most of us, most of the time, the functionality on offer is so useful that this is a bargain we’re more than happy to strike, yet it remains distressing that its terms are rarely made explicit.

    ... »

    When we move through the world with a smartphone in hand, then, we generate an enormous amount of data in the course of our ordinary activities, and we do so without noticing or thinking much about it. In turn, that data will be captured and leveraged by any number of parties, including handset and operating system vendors, app developers, cellular service providers, and still others; those parties will be acting in their interests, which may only occasionally intersect our own; and it will be very, very difficult for us to exert any control over any of this.

    ... »

    Equipped with these devices, we’re both here and somewhere else at the same time, joined to everything at once yet never fully anywhere at all.

    The individual networked in this way is no longer the autonomous subject enshrined in liberal theory, not precisely. Our very selfhood is smeared out across a global mesh of nodes and links; all the aspects of our personality we think of as constituting who we are—our tastes, preferences, capabilities, desires—we owe to the fact of our connection with that mesh, and the selves and distant resources to which it binds us.

    ... »

    It’s easy, too easy, to depict the networked subject as being isolated, in contact with others only at the membrane that divides them. But if anything, the overriding quality of our era is porosity. Far from affording any kind of psychic sanctuary, the walls we mortar around ourselves turn out to be as penetrable a barrier as any other. Work invades our personal time, private leaks into public, the intimate is trivially shared, and the concerns of the wider world seep into what ought to be a space for recuperation and recovery. Above all, horror finds us wherever we are.

    ... »

    We need to understand ourselves as nervous systems that are virtually continuous with the world beyond the walls, fused to it through the juncture of our smartphones. And what keeps us twitching at our screens, more even than the satisfaction of any practical need, is the continuously renewed opportunity to bathe in the primal rush of communion.

    Whether consciously or otherwise, interaction designers have learned to stimulate and leverage this desire: they know full well that every time someone texts you, “likes” your photo or answers your email, it changes you materially, rewiring neurotransmitter pathways, lighting up the reward circuits of your brain, and enhancing the odds that you’ll trigger the whole cycle over again when the dopamine surge subsides in a few seconds. This clever hack exploits our most primal needs for affirmation, generally from the most venal of motivations. But it can also sensitize us to the truth of our own radical incompleteness, if we let it, teaching us that we are only ever ourselves in connection with others. And as we have never been anything but open and multiple and woven of alterity—from the DNA in our cells, to the microbes in our guts, to the self-replicating modules of language and learned ideology that constitute our very selves—in the end maybe the network we’ve wrought is only a clunky way of literalizing the connections that were always already there and waiting to be discovered.
    https://longreads.com/2017/06/13/a-sociology-of-the-smartphone
    Tags: , , , by rhatto (2017-06-17) | Cache
    Voting 0
  7. -
    https://ollieparanoid.github.io/post/postmarketOS
    Tags: , , , , by rhatto (2017-06-11) | Cache | PDF | PNG
    Voting 0
  8. -
    http://money.cnn.com/2017/06/07/techn...curity-poor-digital-divide/index.html
    Voting 0
  9. A localização de cada monitorado é transmitida pela rede de telefonia móvel através de uma VPN (rede virtual privada, um túnel de informação que é criptografado para evitar interceptações do sinal). Mas, como a cobertura de celular não é lá essas coisas, foi preciso criar uma adaptação tecnológica para o Brasil. Fontes do sistema prisional que não têm permissão para dar entrevistas me disseram que a maioria das tornozeleiras nacionais funciona com dois chips de operadoras diferentes (Claro, Vivo, Tim e Oi aparecem nos sites das fabricantes como parceiras). São escolhidos os chips das duas operadoras de telefonia que tiverem o sinal mais forte na região da casa do monitorado. Se um falhar, o outro entra em ação.
    http://piaui.folha.uol.com.br/c/a-minha-se-chama-toto
    Voting 0
  10. -
    http://m.tecmundo.com.br/politica/117...tphone-android-criptografado-abin.htm
    Voting 0

Top of the page

First / Anterior / Próximo / Last / Página 1 de 9 fluxo de links: Tags: smartphone

Sobre - Propulsed by SemanticScuttle