Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Search Engines

What are location services and how do they work?

Proton: “Location services refer to a combination of technologies used in devices like smartphones and computers that use data from your device’s GPS, WiFi, mobile (cellular networks), and sometimes even Bluetooth connections to determine and track your geographic location. This information can be accessed by your operating system (OS) and the apps installed on your device. In many cases, this allows them to perform their purpose correctly or otherwise deliver useful content and features.  For example, navigation/map, weather, ridesharing (such Uber or Lyft), and health and fitness tracking apps require location services to perform their functions, while dating(new window), travel(new window), and social media apps can offer additional functionality with access to your device’s location services (such as being able to locate a Tinder match or see recommendations for nearby restaurants ). There’s no doubt location services (and the apps that use them) can be useful. However, the technology can be (and is) also abused by apps to track(new window) your movements. The apps then usually sell this information to advertising and analytics companies that combine it with other data to create a profile of you, which they can then use to sell ads. Unfortunately, this behavior is not limited to “rogue” apps. Apps usually regarded as legitimate, including almost all Google apps, Facebook, Instagram, and others, routinely send detailed and highly sensitive location details back to their developers by default. And it’s not just apps — operating systems themselves, such as Google’s Android and Microsoft Windows also closely track your movements using location services.  This makes weighing the undeniable usefulness of location services with the need to maintain a basic level of privacy a tricky balancing act. However, because location services are so easy to abuse, all operating systems include built-in safeguards that give you some control over their use. In this article, we’ll look at how location services work and show how to manage their use…”

Google – Introducing the Frontier Safety Framework

The Framework – The first version of the Framework announced today builds on our research on evaluating critical capabilities in frontier models, and follows the emerging approach of Responsible Capability Scaling. The Framework has three key components: Identifying capabilities a model may have with potential for severe harm. To do this, we research the paths… Continue Reading

When Online Content Disappears

“38% of webpages that existed in 2013 are no longer accessible a decade later The internet is an unimaginably vast repository of modern life, with hundreds of billions of indexed webpages. But even as users across the world rely on the web to access books, images, news articles and other resources, this content sometimes disappears… Continue Reading

Data brokers are undermining country’s safety, privacy and security “In Jersey and beyond, our law enforcement, judges and elected officials are putting both their privacy and lives on the line to serve. We must take steps in Congress and beyond to protect the well-being of those who choose to work for the people. New Jersey saw the acute need for privacy for our… Continue Reading

Revolutionary New Google Feature Hidden Under ‘More’ Tab Shows Links to Web Pages

404 Media: “After launching a feature that adds more AI junk than ever to search results, Google is experimenting with a radical new feature that lets users see only the results they were looking for, in the form of normal text links. As in, what most people actually use Google for. “We’ve launched a new… Continue Reading

12 Best Deep Search Engines to Explore the Invisible Web

MakeUseOf: “Key Takeaways The invisible web is vast, including the deep & dark web. Specialist search engines like Ahmia and Torch can access it but use Tor to access individual sites from the search results. Sites like Pipl, Directory of Open Access Journals, The Wayback Machine, Veridian, and Project Gutenberg hold valuable content for different… Continue Reading

5 Ways to Access Onion Sites Without Tor Browser

MakeUseOf: “Key Takeaways Onion sites are unindexed web addresses on the dark web with “.onion” suffixes. Compared to other methods, using the Tor Browser is the safest way to visit onion sites. Accessing onion sites using everyday browsers poses significant security risks. You can use Tor proxies, browser extensions, or Proton VPN to access onion… Continue Reading

Even if you think AI search could be good, it won’t be good

Pluralistic: “The big news in search this week is that Google is continuing its transition to “AI search” – instead of typing in search terms and getting links to websites, you’ll ask Google a question and an AI will compose an answer based on things it finds on the web: – Google bills this as… Continue Reading