{"id":2053,"date":"2018-02-22T20:49:57","date_gmt":"2018-02-23T03:49:57","guid":{"rendered":"http:\/\/www.awesomescienceprojects.com\/blog\/?p=2053"},"modified":"2018-02-09T01:15:25","modified_gmt":"2018-02-09T08:15:25","slug":"privacy-and-drone-recordings","status":"publish","type":"post","link":"http:\/\/www.awesomescienceprojects.com\/blog\/?p=2053","title":{"rendered":"Privacy and Drone Recordings"},"content":{"rendered":"<p>As more people begin to use drones there is a very definite threat to the privacy of people. It is possible for a drone to record activities of a full neighborhood without the residents being any the wiser. This can be potentially dangerous specially if used with the wrong intention.<\/p>\n<p>Cyber security researchers at\u00c2\u00a0Ben-Gurion University of the Negev (BGU) and Weizmann Institute of Science have some ideas that can help. They have come up with a simple method that allows a person with a laptop and a flickering object to check if a drone is recording a specific target.<\/p>\n<p>The Israeli researchers have come up with a couple of ways to check if your privacy has been invaded. The best part of the <a href=\"http:\/\/ezinearticles.com\/?Fun-Online-Homeschool-Experiment-Using-Soda-and-Mentos&amp;id=2341349\">science project<\/a> is that it can be done by anyone. It does not require any sophisticated hacking or cryptographic breaking skills. It uses smart film and a software along with something called an FVP channel.<\/p>\n<p>They have done a couple of successful demos wherein the cyber security researchers were able to positively identify that a neighboring drone was indeed recording the house. This could go a long way in military use as well as for civilians who will now be able to prove that their neighbors violated their privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more people begin to use drones there is a very definite threat to the privacy of people. It is possible for a drone to record activities of a full neighborhood without the residents being any the wiser. This can be potentially dangerous specially if used with the wrong intention. Cyber security researchers at\u00c2\u00a0Ben-Gurion University [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2053","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/2053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2053"}],"version-history":[{"count":1,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/2053\/revisions"}],"predecessor-version":[{"id":2054,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/2053\/revisions\/2054"}],"wp:attachment":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2053"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}