tv Shift Deutsche Welle April 1, 2023 4:02am-4:16am CEST
4:02 am
dot com, the so called revenge porn is becoming a serious problem. a i is helping with the detection of all time and north korean hacked us decrypt currency with 1600000000 euros. these are the topics that have move the tech world. ah, the revenge born is everyone's nightmare finding new or sexually explicit images of yourself online uploaded without your consent victims such as stars like american actors, jennifer lawrence described feeling violated and helpless. erasing those images from the internet seems impossible, but some online tools can help you stop revengeful. to make it very clear, someone posting your private images without your consent is never your fault. and the most part of the world is actually completely illegal. about one and 12 social
4:03 am
media uses have been victims of image based, sexual abuse or revenge born. that's what to study by you. as a nonprofit organization, cyber civil rights suggests, here's what to do when nonconsensual images of you a published online how to request removal, contact platforms, where the images were posted, report these images for violating the terms of service before contacting the companies take screenshots of the posts that have been published, this is important evidence for your legal case. meta is funding 2 tools to help use us with the removal of explicit content. the new tool will take it down into a minus wire. stop and see i as for adults and has been around since 2021 is one requirement of the picture of the videos in question. need to be on your device, the tools, analyze those pictures and create a unique digital fingerprint. a so called task platforms will look for matches in the system and remove the content. if it goes against the terms of service,
4:04 am
you do not need to be uploaded to the tools and will remain on the on your device. also, the created house cannot be converted back into a file. this insures you don't need to share the same content you're trying to remove that has also ensure that the content can't be uploaded again. several platforms like facebook, instagram, take talk, but also own the fans and integrated the tools. but what about the thousands of websites dedicated specifically to revenge born? who refuse to delete those images? sensor events point is illegal, victims could go to the police and file a case, but there's a stigma around reporting this kind of crime victims often feel embarrassed. i think it's their own fault. the lack of reporting leads to a lack of prosecution which enables abuse us to continue. what needs to be done? i think it needs to be possible to remove images, even if you don't have the originals on. your advice in porn isn't
4:05 am
a tool that uses facial recognition to search the internet for videos and pictures of you. the site is currently under maintenance. once it's up again, the servers will be available for free worldwide tool like these can be used to help find and remove revenge pool. if you are a victim and need help visit this website to find out who you can turn to in your country. all timers can hit anyone, not long ago, american actor chris ham's worth was diagnosed with a predisposition for the disease worldwide. more than 55000000 people live with dementia and all time as disease is responsible for more than 60 percent of all cases. there is no cure for all timers, but early detection is key for a successful treatment. it can really slow down the disease with a i. it might now be possible to diagnose all timers much sooner. eye catching all time us hamp's worth is known for his role as the almighty god of thunder thor. for
4:06 am
the dog, who series limitless, he had his physical and mental capabilities checked. that's when his predisposition to all time us was discovered. every models like us will probably really get an examination like hands with it, but now research isn't us using a i to detect the risk for all time as during routine checkups. be predispositions with an accuracy of 90 point, to present a team of researchers from massachusetts general hospital in the u. s. used in a i to analyze m r i's. the research has proven the deep learning software. it was trained using my images of patients with and without all time, as i learned to detect patterns for all time. as in the images the i was then tested on a database of tens of thousands of clinical brain images from different years. there were my images from about a 1500 patients without signs of all timers and images for more than 2000 patients who had already been diagnosed with the risk of the disease. the i was able to
4:07 am
detect 9 out of 10 cases and could identify even younger patients with a risk fall time us eyes abilities in analyzing a large amount of data. and identifying patents could also lead to other advances in the medical field. is suggesting individual treatment by comparing many different cases a, i could make more personalized medical treatments possible, could be taking into account all sorts of variables like a patients blood pressure, pre existing conditions or age and run them through a database with similar cases this way, the system could recommend individualized and more accurate medication developing new drugs. i could also help in the development of new drugs. a i, systems are very good at calculating complicated processes like gene sequencing or analyzing molecules. but they can also be used to collect and process health data on a massive scale, for example, from health sketches. some experts believe where they,
4:08 am
i taking many different aspects of data into account new drugs could be made available 10 times faster than today. i believe i can never replace a doctor, however, it can be a great medical assistance, but the health sector is by far not the only field where i can be used for the good of humanity, crime, poverty, and pollution. those are some of the most pressing problems, the world faces every day. artificial intelligence has the potential to help solve those problems. but how do we make it happen? in india, one of the most net mc technicians of the world, things are speeding up. can we identify 10 problems of the society which can be solved by a i? that's the question indian prime minister rand, remotely asked the people which every day problem you have fixed by. i know we are some of our colleagues from around the world and identified 3 feels way is needed to keep you safe from crime. i models can sift through police databases and analyze
4:09 am
crime trends this way. they could predict when and where violent crimes will happen . we already have public accessible systems in place when citizens report a crime. the data is used to show crime hotspots on the map that allows people to steer clear of the area footage from public surveillance. cameras can also be analyzed by it could identify suspicious behavioral people, for example, and issue warnings early on, so called predictive policing systems have proven successful in the past, but they also face criticism the databases they work with often rely on the oldest statistics, plus they come to racially biased conclusions a i to 5 pollution by analyzing traffic flow and suggesting improvements, i could make your commute to work smoother, but it could also help with small g s. sampling devices around cities can measure the quality and publish pollution levels in case of high air pollution. i could
4:10 am
issue warnings to the public systems could also monitor traffic to cameras and reacting. we'll attempt to traffic jams or accidents, they could then provide solutions using traffic, light, timing, variable speed limits, and d tours. the collected data could be even more beneficial aiding and planning decisions. for example, with a general speed limit make sense and where should more trees be planted, to improve the quality i to 5 poverty. i can help farmers get better results. it can analyze data to see how planting cycles and fertilizers influence the harvest of properly train the. i could suggest best practices to increase yield in a specific area. it can also money, the weather, data, and advice, thomas, to take necessary actions on time. also high hopes when it comes to a i boosting education and helping people to earn more. and i power learning tools and not only have full for people in remote areas. custom tailor teaching programs
4:11 am
take into account students, individual knowledge, background and learning curve. they have already been implemented in some parts of the world with great success by avoiding over challenge and under challenge students. i systems can also help reduce the number of school dropout. last but least i can take all that repetitive routine tasks for teachers that will enable them to invest more time in taking care of the students beyond the current curriculum. india is trying to involve the populace when it comes to how i can help society. i think that's a great idea from my point of view, a government driven initiative would be better than leaving the development of a technology to private enterprises only. so that's a lot of work to be done. let program us get to it. 3.5000000000 euros, that's the amount of crypto that must stolen by hackers in 2022. your crypto could also be at risk pack of just targeting the began surprises. nearly 45 percent of
4:12 am
crypto tabs are linked to north korean hack. as according to an american block chain analysis, some experts even suspect the cyber criminals are working for the north korean government. the regime is under heavy international sanctions. so hack crypto could be a lucrative income street. let's talk some number of the north korean government pulled in just 130000000 euros from experts last year. why it hackers from the countries bagged? almost 1600000000 euros. the north korean intelligence bureau is believe to use hacker groups specifically for cyber attacks. like crypto hex, according to a recent you and report us officials avoid that north korea will san it's nuclear weapons program with the stolen money. hacking the unhappy about crypto currencies themselves are almost impossible to hack. that's because they're stored on the block chain which uses advance verification and encryption processes. so hackers,
4:13 am
target transactions and platforms. instead, these are the most common methods, rigid hacks. this happens when you are transferring crypto from one block chain to another. like turning bitcoin into a syrian protocol is called ridge, is created and vulnerable to hacking wanted hacks. if you're using software to store crypt on your smartphone or computer echos, can use malware to steal from your wallet. change hacks, crypto exchange bad forms hold huge amounts of trip currency on behalf of their users. when it's changes, i hacked your coins can be stolen. how to protect your crypto? there is one simple rule. you should not handle the crypt a wallet, any d suddenly, then you would an actual wallet with cash. you wouldn't carry around, you entire savings. would you the same as true for crypto currencies in a so called hot for online wallet? on the smartphone or a computer, you should keep
4:14 am
a small amount of bitcoin for daily use, only store savings in the cold wallet. to put it simply isa external devices that are offline. most of the time for crypto exchanges, there's unfortunately not much you can do aside from to agree search check out who runs the exchange and what they are security measures are. make sure you trust them to keep your crypto safe. are you afraid of heck of stealing your crypto, or do you trust the technology? let us know that, that for me. bye bye. ah, with a guarantee. more people than ever on the leave we'll divide in such a better life. one in los angeles as a committed god, the law goes on national. it's not the noun here is it america? unknown. the god!
4:15 am
raggedy or finance! double pay the thing nanda bernice one back to the gun. find out about rubinez story in some migraines. reliable news for migraines. wherever they may be would you work as an architect? i go all in or not at all. women in architecture. why are they so invisible? to the larger public we decided to ask them what is the poetry, the secret of a house about their struggles and dreams? if i wrote walkability of huge, they have so much to lose shattering the glass ceiling women in architecture. this has to be really, really good starts.
25 Views
Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=1003762907)