freemexy's Blog

Moving to China: what you need to know

Your kids won’t automatically pick up Mandarin
Many newly arrived expats assume that their kids will absorb the language, simply by living in China. The reality is that you and your children will largely exist in an expat bubble. Once you have experienced the “real China” a couple of times you will really appreciate this bubble. However, it does have its drawbacks when it comes to language learning. I'd therefore advise ...Moving to Shanghai
Choose your school carefully
Our Dutch friends chose one with a good reputation, however it gave close to zero Mandarin tuition. Consequently, after 10 years, their children left China unable to communicate in Chinese beyond being able to say hello (ni hao) and counting to 10. By contrast (more down to luck than any skill on our part), our children left China at a state of near fluency thanks to the pro-Mandarin fluency at their international school. So, if you want your kids to learn the language, do your homework on the schools before you go.
The adult has context. The posting to China is just another chapter in a long list of chapters. There was a before and there will be an after. To young children, however, who have very little experience to look back on, the expat adventure can quite easily come to feel like the whole book. Not an exciting transient adventure but an overwhelming new life.
So it was with my daughter, Isabel, who arrived with us in Shanghai when she had just turned three. We had wrongly assumed that a young child’s world was her parents and so long as she was with us, she would be happy. Wrong.
It wasn’t long before Isabel was showing signs of a growing insecurity. She increasingly clung to her Mum and started to wet herself regularly. I never realised that such young children had a real feeling of national identity. However, quite comically, it became clear that Isabel feared she was losing hers. My wife Heather had complimented her on her Chinese a few times only for Isabel to maintain steadfastly that she didn’t speak any Chinese (despite us witnessing her ordering food in restaurants in Mandarin, and speaking it in the school playground).
One day, I came home from work to witness Isabel having a fierce and lengthy slanging match in Chinese, with the ayi.
"Qing Hui said that I had to do what she said and I said no…" complained Isabel when I asked what was going on. At which point I interrupted her and said “I thought you couldn’t speak Chinese?"
To which she replied: "Of course I don’t speak Chinese Daddy. You know that. I’m English!"
In time Isabel settled down and a more happy, contented demeanour returned. She realised that her identity was secure and this new, seemingly overwhelming environment, was not really a serious threat to her and her identity. I was pleased to see my little girl happy again though rather selfishly, I came to lament the disappearance of her comic ‘little Englander ‘ routine.

Germany's taxi drivers protest Uber deregulation plans

Taxi drivers across Germany on Wednesday protested against government plans to relax regulations that would allow ride-hailing services such as Uber to operate in the country.
The German Taxi and Rental Car Association (BZP) called it "the largest taxi protest in the history of the federal republic."Currently, the taxi industry has managed to stave off greater access to the German market for such services. Uber has permission to operate in Berlin, Munich and Dusseldorf, albeit under heavy restrictions, including requiring special licenses for drivers.To get more news about uber in germany, you can visit shine news official website.
The government has proposed relaxing those restrictions. However, the taxi industry has urged Berlin to shelve the reforms, saying it would decimate the livelihoods of taxi drivers.Transport Minister Andreas Scheuer said the government needs to take a balanced approach towards liberalization.
"We need a good supply of taxis that operate in fair, competitive conditions and with good social standards," Scheuer said at a taxi protest in Berlin, according to his spokesperson. "No one wants unfair, unregulated situations like in other countries."Uber and other ride-hailing services have been criticized for undermining the heavily-regulated industry, failing to provide safety nets for drivers and, at times, compromising the security of clients.
But last year, Scheuer said Uber and other ride-hailing services provided new opportunities: "We can create new possibilities, especially in rural areas and for older people, with car services and pooling systems."
The minister also acknowledged via Twitter the upcoming protests on Tuesday, thanking a taxi driver for taking him to parliament and including a video of a two-minute conversation between the two in which Scheuer claimed he could meet "six and a half" of the seven demands issued to him by the taxi drivers' association.

This smart farm in Wuzhen is producing tomatoes that get tender-loving

Red, orange, yellow, purple, green ... a total of 18 varieties of tomatoes from around the world can be seen in one bright, intelligent glass greenhouse, powered by a 5G network, at the Wuzhen International Internet Agriculture Expo Park.To get more news about wuzhen, you can visit shine news official website.

Located in a small town in east China’s Zhejiang province where the World Internet Conference takes place once a year, about 2,800 tomato plants are receiving ‘five-star’ treatment in this special greenhouse.

This includes ideal temperature and humidity settings, customised nutrition fed to the plants through small black pipes and even background music – thanks to sensors linked to a 5G network operated by China Mobile, one of China’s largest telecommunication companies.

Each tomato plant is set in a hydroponic rockwool cube, with a catheter to transport water and nutrients. A variety of sensors monitor temperature, light, water, humidity and fertiliser levels and send that data over the 5G network in real time which allows a control system to adjust settings more accurately to maximise crop yields.
There is also a 5G-linked pest and disease control system in the greenhouse that can kill bugs with ozone spray, Dong Yongze, chief executive of Daoji Agriculture – which has invested in and backed the smart farm – said in an interview with the Post this week.

“We are all exploring 5G applications at the present time as there is not much 5G equipment available yet,” said Zhao Yu, who runs the smart farm programme at Daoji Agriculture. “5G networks are faster and more accurate – with 4G, the [management] system froze frequently and we needed to wait for the analysis. 5G gives us the result immediately.”

Zhao added that in the past they needed to have a stand-alone control panel near the greenhouse, which could not be accessed via a smartphone. Now all the systems can be managed remotely via a 5G handset.

The planting density is much higher at the smart farm compared with traditional greenhouses, and the new technology helps to eliminate seasonality factors. Dong said that crop outputs have doubled and even tripled in some cases. Manpower is also a consideration.

China is in a race with countries around the world to roll out 5G wireless networks, which offer faster data rates, reduced latency, energy savings and massive device connectivity. The mobile technology is seen as key to dominance in fields such as factory automation, robotics and autonomous driving.

In June, China granted commercial 5G licences to the country’s three telecommunications network operators – China Mobile, China Unicom and China Telecom – as well as the nation’s cable network giant, China Broadcasting Network, amid efforts by Beijing to kick-start implementation of the new technology.

Wuzhen, one of several pilot zones, installed its first commercial 5G base station in March this year and now the whole town has network coverage.Industry analysts foresee some problems beneath the hype and promise of 5G though.

Some products failed secondary total yeast

Marijuana consumers, you’re going to want to check your pot products. According to the Nevada Department of Taxation, some marijuana failed yeast and mold tests.To get more news about failed products, you can visit shine news official website.
The Nevada Department of Taxation is hereby issuing a health and safety notice advising consumers and patients to avoid consuming marijuana, which is the subject of this notice. The affected marijuana, listed below, failed secondary total yeast and mold testing conducted by an independent testing laboratory. The results indicated total yeast and mold on the affected marijuana existed at levels of 11,193; 41,661; 36,082; and 39,971 CFU/g. The amount permitted under NAC 453D.780 is <10,000 CFU/g. Additional samples of the affected marijuana are being sent for confirmation testing at a laboratory operated by the State of Nevada Department of Agriculture. While the results are pending, the Department is advising consumers who have purchased the affected marijuana to avoid consuming the products until the results of the confirmation testing are received by the Department.”
It is believed the affected marijuana was sold in the form of flower and pre-rolls between 7/11/19 and 8/19/19 by the following Retail Stores/Medical Dispensaries:

Acres Medical, LLC
The Apothecary Shoppe – D. H. Flamingo, Inc
Blackjack Collective – Naturex II, LLC (license # 50748233769645953480)
The affected marijuana was cultivated and harvested between 5/28/19 and 7/10/19 by:

D. H. Aldebaran Inc.
Las Vegas Natural Caregivers, LLC
The Department of Taxation says consumption of the affected marijuana should particularly be avoided by individuals with suppressed immune systems or who are susceptible to the presence of yeast or mold.

As we rush toward convenience, say so long to privacy

We’re all guilty of the same thing.
In our rush to download and install apps, we carelessly breeze through all the necessary permissions without even a second glance. Facebook wants to record audio? Absolutely. Gmail needs access to our phone contacts? You bet. Instagram wants to eavesdrop on our camera roll? Makes perfect sense!
It’s a similar story when we rely on Facebook or Google for logins on sites like Soundcloud or Airbnb. After all, who doesn’t like a one-click login? It’s so much easier than a cumbersome sign-up process via email registration.
Some of us might not realize that the more data points we feed to tech firms, the smarter (and more invasive) they become. Others might shrug their shoulders and say it’s a necessary evil; after all, tech can’t serve us unless it knows more about our habits and preferences.
If you think about the sheer reach that technology has in our lives, the data points are staggering. Forget about things like browsing habits and social media likes; tech products know our daily commutes, the kind of music we listen to in the car, the food we like to eat, and perhaps even our private conversations.
According to a study by the University of Pennsylvania, Americans don’t really like the trade-off a great deal, but most survey respondents have simply resigned themselves to the inevitability of forking over personal information in exchange for technology convenience.
The study adds that people don’t feel as if they’re in a position to make a choice and that it is “futile to manage what companies can learn about them.” While they don’t want to lose control over their information, they’re powerless to stop it from happening.
Where are we going with this?
To say that the internet has been one of the most transformative inventions in modern history wouldn’t be a stretch. The collective benefits of the internet are staggering: It’s broken down barriers to information and democratized access to knowledge to a level previously unheard of.
It’s helped people escape poverty, learn new skills, engage in financial transactions, contribute to the global economy, and open up employment opportunities at a scale never seen before.
Tech developers from India can work on projects in the United States simply with a functioning internet connection. Software services are delivered via the cloud to clients all around the world. Video conferencing apps help families stay in touch. In short, the world would be a poorer place without the internet. Even the United Nations agrees: It declared the internet as a fundamental human right in 2016, frowning on attempts to censor or restrict access.
But the internet today has morphed into a surveillance and tracking mechanism, monopolized by companies with deep pockets and legislative heft. That’s not how the original founders envisioned it to be.
Tim Berners Lee—the man credited with the idea behind an information superhighway—wrote an impassioned appeal in The Guardian two years ago, urging a fundamental transformation of the web. He wrote that it had strayed too far from his original desire of an “open platform that would allow everyone, everywhere to share information, access opportunities, and collaborate across geographic and cultural boundaries.”
First and foremost among Lee’s concerns is that people have lost control over their personal data. He states that widespread data collection by companies leads to an environment of sharp reductions in freedoms, particularly in countries with repressive regimes that are able to coerce companies into sharing the information they collect.
The world’s most valuable resource?
The Economist, in a 2017 op-ed, neatly summed up the demand for personal information by declaring that the world’s most valuable resource was no longer oil, but data. And it’s hard to argue with the cited reasons: Facebook’s 22 billion USD purchase of WhatsApp, the fact that Alphabet, Google, Apple, and Facebook are among the world’s most valuable companies, and how Tesla is worth more than General Motors despite selling a fraction of the same number of cars.
As voracious consumers of internet services and internet-connected products, are we left with any choice? And as we move to a future of connected and smart cities, will we become even more immersed in a mechanism for the government to collect information about its citizens?
I’m not trying to discount the positive elements of smart cities. If done right, they have the potential to make our roads safer, detect and prevent disease outbreaks, efficiently monitor energy use, and curb pollution. No resident would say no to that.
But the potential privacy risks are hard to ignore. Alphabet’s Sidewalk Lab project in Toronto is a case in point. Initially heralded by Prime Minister Justin Trudeau as a “thriving hub for innovation,” the project has attracted its fair share of controversy, including the resignation of Ann Cavoukian, who was the project’s director of privacy.
Cavoukian resigned last year, claiming that she was misled over data-collection policies. She agreed to be part of the initiative after the assurance that all data collected in the Sidewalk Lab’s project would be wiped clean but was later informed that third parties could access identifiable information.
“I imagined us creating a Smart City of Privacy, as opposed to a Smart City of Surveillance,” she wrote in her resignation letter.
A member of the advisory panel for the project also resigned, citing unaddressed privacy concerns. But has the project stalled or reimagined itself? Not for now, at least.
This brings us back to the essential questions. How much of our personal lives are we willing to give up for greater convenience? If governments make the decision to switch to smart cities, do we have a say in the matter? And what, if at all, is the final tipping point?
Unfortunately, based on recent trends, it seems we’ll just shrug our shoulders and move on. There might be a few dissenting voices and angry op-eds. But we’ll go back home and ask Alexa to play our favorite music. Uber Eats will deliver our pizza. Privacy can wait another day.
When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN. RitaVPN is a relatively new VPN service, but it’s already making a name for itself,which makes it one of the Buy VPN in 2019.

Staying private online could save you big bucks

By far the biggest offenders when it comes to mining your data are not governments or police, but rather advertising agencies. They will buy up your credit card history from your bank, embed trackers into the web pages they visit and trick you into downloading tools that monitor your behavior as much as they can.
The goal: to learn about your consumption behavior and to predict not only what you want to purchase at what time, but also how much you are willing to pay for it. Every good and service has value to you, something that economists call ‘reservation price.’
What is your reservation price?
Your reservation price is the exact amount you are maximally willing to pay for a product. The further below the reservation price you are able to acquire a product, the more beneficial the trade is for you.
Your reservation price for a good might change all the time. When you are returning from a long hike you are willing to pay more for water than at other times. If you are in a hurry you might be willing to pay more for a ride than when you have time.
If an advertising agency knows enough about you, it might be able to make a good guess about what your exact reservation price is for a charging cable, a flight or a hotel room. They will be able to always charge exactly as much as something is worth to you. No more bargains, no more price transparency, with all the value generated from trade and exchange ending up with the merchant.
In the physical world such massive price discrimination is difficult to execute. It might be difficult to identify customers before their purchase (as opposed to at the point of payment via credit card), and even more difficult to quote every customer a different price.
Online, however, this can be easy, as customers are easily identifiable through their accounts, email addresses, saved cookies and IP addresses. A website might even be able to identify you with just your browser.
Consider the following tactics to stay anonymous online:
Use a VPN
A VPN will hide your IP address from the site you are visiting, making it hard to identify your income by ZIP code or correlate your searches from previous visits. You can also switch servers to see prices for visitors from various countries, which can be an advantage especially on travel sites. For online shopping, be careful with free VPNs or Tor, as your web traffic might be mixed with those of scammers, and your payment might be declined as a result.
Clear your cookies or use an incognito window
Your browser’s incognito mode will not make you perfectly anonymous by itself, but it will open a new window without any existing cookies. This makes it even harder for sites to correlate your visit with previous visits to find out what you commonly shop for. When you close your incognito window all its cookies get automatically deleted, and when you open it again you start off fresh.
Use an ad blocker
You can use an ad blocker such as Ublock Origin (Chrome, Firefox, Opera) as a browser extension to not only block you from seeing ads but also prevent advertisers from learning about your habits. The EFF’s Privacy Badger can also help with further restricting your browsing experience.
There’s a very tangible benefit to protecting your privacy. By preventing companies from learning about your spending habits, you will get better deals in the long run and make it impossible for companies to discriminate against you by charging you higher prices.
When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN. RitaVPN is a relatively new unblock websites, but it’s already making a name for itself,which makes it one of the best VPN in 2019.

Cryptojacking: What is it and how do I guard against it?

The term “cryptocurrency,” a combination of “cryptography” and “currency,” alludes to the fact that cryptocurrencies are a form of digital money that uses cryptographic keys to identify its account holders and signatures to authenticate transactions. Cryptocurrencies only enter circulation through “mining,” a process that’s used both for creating new units of the currency and securing the ledger from tampering.

The mining process typically involves powerful, high-performance computers, which miners use to compete with one another to reap rewards. Before cryptocurrencies became as popular as they are today, it was possible to mine them with regular computers. Now, however, cryptocurrencies such as Bitcoin are typically mined in extensive farms that feature hundreds of computers working in unison and around the clock.

Photo: Wikimedia

With its immense growth in scale, cryptocurrency mining has become a very expensive affair, requiring steep amounts of capital for the initial infrastructure as well as high recurring monthly bills. This has led duplicitous hackers to seek workarounds in the form of cryptojacking.

What is cryptojacking?
Plainly speaking, cryptojacking is the illicit use of third-party devices such as laptops, tablets, or smartphones to secretly mine cryptocurrency without the knowledge or consent of device owners. This type of malicious hack steals a portion of your computer’s resources and dedicates it to solving cryptographic puzzles on behalf of the hacker.

As a victim of cryptojacking, you’ll be saddled with all the costs, such as high electricity bills and inefficient system performance, without reaping any of the rewards. Needless to say, it’s a situation that you would rather avoid.

Lots of cryptojacking software is designed to be subtle, so users don’t notice that something’s amiss. After all, it’s not like we’re in the habit of constantly checking system performance and examining the processes in our system tray. If our devices perform slower than usual, we blame the latest software update or point to the dozens of tabs open on our browser. And if our cooling fan turns on more often than it did before, we just assume that our device needs to be upgraded or serviced.

However, it’s likely these subtle signs that indicate the presence of cryptojacking software.

How do I detect cryptojacking?
If you feel that you have fallen victim to a cryptojacking scheme, the first thing you should do is check CPU usage.

For Mac users, simply navigate to Launchpad > Activity Monitor > CPU.

For Windows users, open up Task Manager > Processes > CPU.

A CPU running at normal levels should look something like this:

If your system utilization is at a high percentage, despite minimal use of processes and apps, it’s possible that you’ve fallen victim to a cryptojacking scheme.

Other telltale signs of cryptojacking are overheated CPUs and consistent laggy performance.

How can I guard against cryptojacking?
Malicious programs designed to covertly mine cryptocurrencies on your device spread just like any other virus or malware. Hence, to guard against them requires an adherence to prudent security practices.

For starters, this means refraining from clicking links in emails sent by people you don’t know or don’t trust. It’s also important to keep your devices updated at all times (we recommend turning on automatic updates) and only install software or apps from official marketplaces.

There are also some browser add-ons that claim to guard against cryptocurrency mining. For starters, the Opera browser has an in-built protection that guards against this threat, akin to ad-blockers on web pages.

If you prefer to stick with Chrome, you can download the No Coin extension, while Firefox users can utilize the NoMiner add-on.

We also recommend using a robust antivirus product, making sure to update it frequently and running a deep scan every few weeks. Ad blockers like uBlock Origin and Adblock Plus offer protection, too.

Is cryptojacking widespread?
The amount of cryptocurrency that can be mined from a single device is rather miniscule, but when cryptojacking software reaches hundreds of thousands of devices, it becomes very lucrative. Plus it entails zero cost for the hacker.

That’s precisely why cryptojacking is far more common than you might think. The Federal Trade Commission warns against it, urging users to be mindful of “scammers using your computer as their virtual ATM.” In 2017, Fortune declared cryptojacking the “next big cybersecurity threat.” Even Cristiano Ronaldo’s official website has fallen victim to cryptojacking, with dubious code capable of mining Monero surfacing a couple of years ago.

Cryptojacking isn’t likely to magically disappear anytime soon, and hackers may well come up with even more ingenious methods to extract our system resources for their benefit. However, as long as you remain cautious and alert, it’s certainly possible to avoid the deleterious effects.

On the flipside, if you want to share some of your excess computing resources to help a good cause, then check out Donate Your Tab.
When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN. RitaVPN is a relatively new VPN service, but it’s already making a name for itself,which makes it one of the fast VPN in 2019.

Is your car spying on you?

Unlike many other devices, cars are not prefixed with the word smart. Even if they’re connected to the internet—and have the ability to collect and sell your data to third parties. And yet, that’s exactly what most modern cars can do.
In recent years, carmakers have turned your vehicle from a product you own and control to one you merely use and license, much like software. The mechanisms of this are hidden between dozens of pages of terms and conditions.
Apart from its implications of what “ownership” really means, there is the fear that the location and personal data collected by your car infringes on your privacy as it is inevitably transferred to the car manufacturer and sold to third parties. This is similar to the practices at telecommunication providers, which have, in some of the worst examples, put people in dangerous situations by selling their location data to stalkers.
Does your rental have car spyware?
Rental car companies were among the first to seize the opportunities from readily available surveillance technology to start car tracking their customers. This was driven partly by their interest to introduce new fees, reduce insurance costs, enforce contract limits, fight theft and gather data about their clients’ behavior.
Hertz went as far as installing microphones and cameras in their cars, although the company later insisted those were never turned on. Rental companies that fined their customers for speeding (with payments that went to the company, not the local government) were found in violation of the law.
When you rent a car, you might have some choice between different rental companies and their policies regarding surveillance. But ultimately, the company owns the vehicles and can install surveillance tools at will.
Some of these tools might even go beyond simple spying, such as locking your car if you take it out of a designated zone or off-road. The renter might then have to pay a fine to regain access.
Cars leased or financed can also be subject to agreements that allow car manufacturers or the leasing companies to scoop your private data. Mercedes-Benz was caught handing this data to bailiffs in cases where drivers were behind on their payments.
The new normal
Almost all modern luxury cars are connected to the internet and have some location tracking device installed, either based on GPS or its Russian counterpart Glonass. The car tracks its location passively, though some actively send it to remote servers when a mobile internet connection is available.
These systems can be used to save lives, for example in the event of an accident, but can also allow authorities and criminals to locate you in real time whenever they desire. At the very least, the data can be obtained from your car using the on-board diagostics (OBD) systems, which have become mandatory for cars sold in most countries since the early 2000s.
Ford executives have publicly bragged about their ability to know where each of their cars is at anytime to detect traffic violations such as speeding. Some cars even have cameras pointed at the driver at all times to detect whether a driver is sleeping.
Many of these features will help make driving safer. But with a car’s software becoming the most valuable intellectual property inside a car, systems remain heavily locked down, leaving consumers unable to verify the mechanisms that control access to cameras and sensors.
Consumers instead have to trust the manufacturer and their government to respect their privacy and follow the law when accessing sensitive information. This is not acceptable.
Smart car tips: How to stop your car spying on you
While people do like buying smart surveilled electronics, surveys also show they care about privacy. Consumers have to be alert about smart car dangers and demand to be informed about their car’s capabilities and data policies.
Purchasing an older, used car without internet connection and cameras is always an option, too.
Eventually, we will either see car makers become more transparent about what they do or earn our trust in other ways.
We might see cars developing similarly as phones, for which the open-source operating system Android competes with closed-source Apple iOS. Android users are able to install their operating system themselves, while Apple users trust the manufacturer to respect their privacy.
In both cases, users often make the decision between opting in to draconian surveillance regimes and protecting their personal information.
When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN. RitaVPN is a relatively new VPN service, but it’s already making a name for itself,which makes it one of the best VPN in 2019.

Opt out of a face scan at the airport? Easier said than done.

Airports and airlines are rapidly adding facial recognition technology to their security processes, whether travelers like it or not.

Air travel is stressful—from finding the best flight prices to lining up for what feels like hours to get through airport security before finally squeezing into your ever-shrinking seat on the plane.

The last thing you’d want is to be that person holding everyone up at security emptying your pockets or getting scanned for metal objects, all under the disapproving gaze of airport security and fellow travelers behind you.

Your desire to spend as little time as possible going through security is exactly what airports and airlines are betting on when they ask to scan your face. To discourage you from opting out, they make choosing not to participate appear disproportionately time-consuming, if not completely unavailable as an option.

How does facial recognition work at airports?
Airports in the U.S. and a growing number of countries are adopting facial recognition technology with the goal of streamlining security checks while also collecting and storing biometric data from your face.

Travelers going through a facial recognition scanner.
A facial recognition scanner in Orlando International Airport. Source: Brian Naylor/NPR
The process typically requires you to stand in front of a camera, placing your passport on a scanner so that the machine can see if your face matches your passport picture. This is supposed to replace manual passport checks by airport staff, who apparently can’t be trusted to match the face in your passport with your face in real life…

Why are airports implementing facial recognition?
Facial recognition, and biometric screening at large, was given the green light in the U.S. in 2017 after Donald Trump issued an executive order allowing airports to implement the technology in ways they see fit.

The U.S.’s Transportation Security Authority (T.S.A.) argues that biometric technology is required to “meet the challenges of evolving security threats, rising air travel volumes, resource constraints, and limits on operational footprint.” Airports outside the U.S. are also trialing this technology, which could expedite the check-in process and improve the overall traveler experience.

Some airports have even expanded this technology to incorporate facial recognition at every stage of your departure—the Caribbean island of Aruba has managed to make check-in, baggage check, immigration, and boarding dependent on biometric technology. Without any apparent irony, they have named the process Happy Flow, telling you, “Face it! You will love it!

Illustration of how Happy Flow works.
Happy Flow uses your face as your passport at almost every stage of your departure. Source: Happy Flow
Why should I worry about facial recognition at airports?
The allure of faster boarding at the airport is strong, and if facial recognition technology shaves minutes off your waiting time, doesn’t everyone win?

Well, no. Surrendering your biometric data to a system that has dubious biometric confirmation rates and insufficient legal accountability leaves room for abuse, bias, and the complete invasion of your personal privacy. Not to mention the very real possibility of this data being compromised by hackers, as it was in India’s Aadhar ID database breach and, more infamously, the leaks in U.S. voter databases.

The U.S. currently has no federal oversight on the use of facial recognition, although several cities have banned its use in public places and lawmakers are trying to place regulations on the technology. Meanwhile, the federal government is rapidly expanding the technology to all major airports.

Without holding the T.S.A. and Center for Border Protection (C.B.P.) accountable for their use of facial recognition technology, there are no limits to how it is implemented in airports, nor are they obligated to tell travelers how to opt out if they wanted to. There is zero mention or consideration of how travelers can opt out of the process in the T.S.A.’s roadmap, which outlines how the agency collects biometric data.

Can I opt out of facial recognition at the airport?
If you’re an American citizen entering or exiting the U.S., you can opt out of face scans—but this isn’t usually made clear.

Since the technology started appearing in major U.S. airports, anecdotes have been trickling through from travelers who have tried to opt out. Their stories have uniformly been negative experiences.

One anecdote came from Allie Funk, who wrote about her experience in Wired. After hearing from Delta Airlines that facial recognition would be used to board passengers, she tried to opt out. There was no information on how to do so. “To figure out how to [opt out],” she wrote, “I had to leave the boarding line, speak with a Delta representative at their information desk, get back in line, then request a passport scan when it was my turn to board.”

Without clear directions on how to opt out, travelers may not even know that it is a choice—which might explain why only 2% of all Delta customers opt out.

It’s not just the U.S. Anecdotes from travelers who have attempted to opt out of facial recognition and other biometric systems at airports from London to Hong Kong attest to how time-consuming the process is—and how troublesome it makes you appear.

It certainly looks like they want to make it as difficult as possible for passengers to reject a facial scan. And that is if you have that option. For non-U.S. citizens at U.S. airports, for instance, compliance with facial scans is mandatory, and photos are stored for up to 75 years on the C.B.P.’s database. For U.S. citizens, the photos are stored for 12 hours.

Airports are betting you’ll choose convenience over privacy
Because there is no legal obligation to tell you that you can opt out, nor any outlined procedure for anyone who wishes to do so, aviation and border authorities are given virtually free rein over how they wish to proceed with such travelers.

Taken from the CBP’s official page on biometrics. They really want you to think it’s super convenient (and that this is how people really text each other). Source: C.B.P.
They make it incredibly inconvenient to bypass any kind of biometric security by first putting the burden of opting out on the traveler (rather than consenting by opting in), then putting them through an even more arduous and time-consuming security check by border agents. Tech executive Amber Baldet tweeted her experience of opting out of biometric scanning, which she said took 30 minutes. The typical traveler doesn’t always have that much time on hand, and going through such a long check could mean missing your flight, on top of probably being put on “a list.”

Biometric scans might very well speed up security checks, but it is only at the cost of giving your biometric data to a government that does not have to be held accountable as to how they handle it. Speeding up this stage of security checks will also give agents more time to search through your phone and social media accounts, or even confiscate your devices.

The future of facial recognition at airports
From London, Shanghai and Delhi to Tokyo and Hong Kong, airports around the world are now at various stages of implementing facial recognition systems. With greater biometric data collection becoming the disturbing new normal, it can be difficult to remain constantly vigilant about avoiding the face scanner.

We are already seeing glimpses into the future of facial recognition in other countries. Earlier this year, a viral tweet showed a Chinese airport kiosk successfully ID-ing a traveler and displaying his flight details and how to get to his gate. The kiosk only needed his face to give him his flight information.

Wow! China Airport face recognition systems to help you check your flight status and find the way to your gate. Note I did not input anything, it accurately identified my full flight information from my face!

— Matthew Brennan (@mbrennanchina) March 24, 2019

The bottom line: It shouldn’t be this difficult to opt out
Trading privacy for convenience is a bad deal for travelers, and it is one that we don’t appear to have a say in or significantly benefit from. But because opting out isn’t made easy or seen as available in the first place, it feels easier to submit, stand in front of the scanner with your passport, and have your face captured and stored in a government database. That is precisely how the authorities want you to feel.

There is little that you can do other than kick up a fuss at security and actively look for ways to opt out. Fight for the Future’s Airline Privacy site lists airlines that have and have not implemented facial recognition. The EFF also has an excellent breakdown on how (if at all) you can opt out of having your face scanned at the airport.
When comes to the issue of online privacy and security, we suggest to use a VPN, and our recommendation is RitaVPN. RitaVPN is a relatively new VPN service, but it’s already making a name for itself,which makes it one of the best VPN in 2019.

3 Cara Menghilangkan Jerawat Menggunakan Buah Pepaya

Inilah 3 Cara Menghilangkan Jerawat Menggunakan Buah Pepaya. Buah pepaya memiliki banyak manfaat karena mengandung sejumlah vitamin, salah satunya sangat baik bagi kulit, termasuk untuk menghilangkan jerawat di wajah. Setidaknya ada 3 cara menghilangkan jerawat di wajah menggunakan buah pepaya.cara menghilangkan jerawat merah di pipi
1. Pepaya dikombinasikan dengan Madu
Cara menghilangkan jerawat yang pertama adalah menggunakan pepaya dan madu.
Kupas setengah bagian pepaya dan potong kecil-kecil. Masukkan pepaya ke dalam blender dan tambahkan dua sendok makan madu, kemudian blender hingga halus seperti pasta. Oleskan pada seluruh wajah atau pada area tubuh yang berjerawat, diamkan atara 40-45 menit. Setelah itu angkat dan cuci wajah dengan air biasa. Lakukan setiap hari guna hasil terbaik.
2. Pepaya dikombinasikan dengan Cuka
Cara menghilangkan jerawat lainnya, Hancurkan pepaya yang sudah matang. Tambahkan air dan cuka sari apel dengan jumlah yang sama dan campur semua bahan hingga menjadi pasta halus. Ambil handuk lembut dan celupkan ke dalam air hangat. Peras air yang berlebih dan letakkan handuk di wajah selama beberapa menit. Oleskan pasta pepaya dan cuka sari apel di bagian atas handuk secara merata dan biarkan sampai mengering. Kemudian cuci wajah menggunakan air normal dan keringkan.
3. Pepaya dikombinasikan Jeruk
Jeruk bermanfaat sebagai zat alami yang membantu mengendalikan kelebihan minyak yang diproduksi kulit. Masukkan dua sendok pepaya yang sudah dilumatkan ke dalam blender dan tambahkan satu sendok makan perasan air jeruk, blender hingga menyatu. Kemudian tambahkan lagi perasan air jeruk. Oleskan merata di wajah atau area yang berjerawat. Biarkan selama 20 menit. Bilas setelah 20 menit.Jerawat merupakan timbunan komedo yang mengeras. Biasanya disebabkan ketika pori-pori tersumbat oleh minyak berlebih, kotoran, dan debu.
Kondisi tersebut akhirnya menjadi tempat berkembang biak bagi bakteri yang menyebabkan jerawat. Bukan hanya di wajah, jerawat bisa muncul di area leher, dada, dan punggung.
Selain itu, jerawat juga bisa muncul karena ketidakseimbangan hormon dan kebersihan yang buruk, misalnya malas membersihkan make-up sebelum tidur.
Untuk meredakan jerawat, kamu bisa mencoba cara alami dengan menggunakan pepaya.
Seperti yang kita tahu, pepaya kaya kandungan vitamin dan sangat baik untuk kulit.
Sifat anti-inflamasi pepaya membantu mengobati jerawat dengan mengurangi kemerahan dan peradangan.