All posts by Paul Stradling

Sustainability-In-Tech : UK’s Largest Carbon Capture Facility Opens In Cheshire

Tata Chemicals Europe has opened the UK’s largest industrial-scale carbon capture facility at its chemical plant in Cheshire to convert carbon dioxide into food and pharmaceutical-grade sodium bicarbonate.

Capturing 10% Of The Carbon Dioxide Produced 

The £20 million Tata Chemicals Europe carbon capture unit at its chemical plant unit in Northwich will capture more than 10% of the carbon dioxide produced at the site’s combined heat and power plant (CHP). The anticipated capturing of 40,000 tonnes of carbon dioxide each year at the new unit will be the equivalent of taking over 20,000 cars off the roads!

Converted To Sodium Carbonate 

The carbon capture unit can claim a world-first as its unique, innovative, and patented process can convert the carbon dioxide captured from energy generation emissions into a purified food and pharmaceutical grade form of sodium bicarbonate (baking soda / bicarbonate of soda) to be known as Ecokarb®.

Exported, And Will Help Kidney Disease Sufferers 

The Ecokarb® produced at the new unit will be exported to over 60 countries, which is expected to generate tens of £millions in export revenue every year. In addition to the revenue generated, one extra special benefit of the project is that much of the sodium bicarbonate exported will be used in haemodialysis to treat people suffering from kidney disease.

Backed By Government Grant

The UK government has backed the project with £4.2m grant through the Department of Business, Energy, and Industrial Strategy’s (“BEIS”) Energy Innovation Programme. The demonstration facility marks a major step towards sustainable manufacturing and will help work towards the UK’s net zero strategy and its aims to capture up to 30 million tonnes of CO2 each year by the early 2030s (and 50 million tonnes by the middle of the next decade).

What Does This Mean For Your Organisation?

This new carbon capture and conversion facility demonstrates how technology can play an important part in not just developing global-scale sustainable manufacturing techniques, but also helping to hit CO2 emissions targets, creating new revenue streams, and helping sufferers of a disease at the same time. The government, which backed the project has also highlighted how it could attract new private capital into the UK and is boost innovation in green technologies. That said, some experts have been less enthusiastic, suggesting that since the CO2 won’t be stored at the Northwich site and will, eventually, be released into the atmosphere, this is more of an emissions decrease project rather than a permanent carbon removal scheme.

Security Stop-Press : Child-Monitoring Android App Eavesdropping Risk

Cybernews researchers have warned that many popular child-monitoring Android mobile apps may also be leaking the parents’ data to potentially malicious third parties via the third-party trackers in the apps. The researchers have also warned that the insecurely implemented Secure Sockets Layer (SSL) certificate handling and open-source code in some of these apps could leave them vulnerable to man-in-the-middle attacks. The advice is for parents to either research these apps fully online before choosing one, or consider the merits of focusing more on teaching children how to recognise online threats e.g., grooming, and how to spot and avoid dangerous websites.

Tech Tip – Avoid Speeding Tickets With Google Maps Feature

If you’re off on your holidays and days out to enjoy the warm weather, there’s an audible speed trap feature in Google Maps can help you monitor your speed and avoid a getting a ticket. Here’s how to use it:

– In Google Maps, tap on your profile photo (top right).

– Tap on ‘Settings’.

– Tap Navigation / ‘Navigation Settings’.

– Make sure that the toggle for ‘Speed Limits’ is on.

Tech News : New Windows Feature Displays Which Apps Have Been Listening-In

The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity.

See Which Apps Have Accessed Your Microphone and Camera 

David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in a recent tweet, saying: “New Windows 11 Privacy Auditing features allow you to see history of sensitive device access like the Microphone.”

The feature has also been introduced in the Dev Channel of the Windows Insider programme.

– The Privacy Auditing feature, which can be accessed via Settings – Privacy & security > App permissions, shows users:

– Which apps have accessed the microphone in the last week, giving dates and times.

– Which apps have accessed contacts, or phone call, message, location, and screenshot data.

Phones Already Have A Similar Feature 

Phone operating systems, for example, already have a similar feature. For example, last June, it was announced that Google’s Android 12 (which was in beta) would have a camera and microphone access indicator which shows users if an app tries to access the device’s camera or microphone. Android 12 was released last October, and the access indicator gives users and indicator in the top-right corner of the status bar when the camera or microphone is in use.  Clicking on the microphone or camera indicators shows the users which apps have accessed their data.

iOS 14 also has a similar feature. An orange dot, an orange square, or a green dot in the status bar at the top of the screen indicate when the microphone or camera is being used by an app.

Microsoft’s Privacy Record 

Microsoft has been criticised over some aspects of its privacy record in recent years, e.g. with Windows 10 being criticised in 2015 over its default settings and personalised embedded adverts. Adding more privacy controls or features, such as the new Privacy Auditing feature is, therefore, likely to get a positive reception from users.

What Does This Mean For Your Business? 

Users are now more aware than ever of data protection and privacy matters and value any ways that their privacy can be protected. For businesses, these are particularly important issues both for compliance, and to avoid potentially costly breaches or providing any social engineering vectors for hackers and other bad actors. This new feature adds a useful transparency element to Windows 11 which could enable users to make better choices about apps in terms of security and privacy and reduce risk to themselves and their businesses.

Tech News : Age Check Face Scan For Instagram

Social media app Instagram has announced that it is testing new methods for age verification of users, including the use of a video selfie.

What Are The Issues? 

This latest announcement by Meta’s (Facebook) Instagram is an extension of an age verification program which the company began in 2019. Finding new technology-based ways to confirm a user’s age will help address several key issues, which include:

– Instagram has a duty to provide ways to safeguard younger users. For example, it already makes accounts private for teens under 16 by default, plus there are privacy settings to control who interacts with a teen and their content. There is also the ability to block and anonymously report other users, along with the ability to track time spent on Instagram, preventing unwanted contact from adults that young users don’t know and limiting the options advertisers have to reach young users with ads.

– As per Instagram’s (and Meta’s/Facebook’s) terms, users (in the U.S.) must be at least 13 years old to sign up (in compliance with the U.S. Children’s Online Privacy Protection Act). The minimum user-age is higher in some countries.

– It’s not always clear what age someone really is, simply by asking questions.

What’s Happening 

Instagram says that it has partnered with Yoti, a leading age verification provider for several industries around the world including social media, gaming, and age restricted e-commerce to develop two verification methods, in addition to uploading their ID, to verify a person’s age. The two new methods that the AI-based Yoti system will now use for age verification are:

– Uploading a video selfie. Instagram (Meta) says that it will only share the image with Yoti, and that Yoti’s technology estimates a user’s age based on their facial features. Meta makes it clear that the selfie is deleted afterwards, and that the technology can’t recognise a person’s identity, just their age.

– Using social vouching. This involves asking three mutual followers who are 18 or over to confirm how old the user is.  The mutual followers must respond within three days.

Meta / Instagram’s Own AI Too 

Meta says that, in addition to testing the new methods of age verification, it will be using its own AI system to help decide if a user is a teen or an adult.

What Happened To ‘Instagram For Kids’? 

Back in March 2021, Meta revealed that it was developing the ‘Instagram for Kids’ service, but this was shelved following lawmakers in the US writing to Mark Zuckerberg demanding that the plan be abandoned over worries about the safety of children on social media platforms.

What Does This Mean For Your Business? 

Meta, Instagram’s owner, has attracted a good deal of criticism in recent years over the safety of young people using its platforms, e.g. body-shaming, and cyberbullying, and was pressured into abandoning ‘Instagram for Kids’ over similar concerns. The company has also been criticised over its past privacy record, e.g. the Cambridge Analytica scandal. These new age verification methods, and the accompanying re-assurance that the selfies won’t be shared (and will be deleted) are a way for Meta to show that it’s trying to comply with child protection laws, trying to make its platforms safer for young people, and re-assure parents that its Instagram platform is safe. Last year, Meta also introduced new rules to stop advertisers from being able to target teens based on their interests although advertisers can still target teens based on age, gender, and location.

Featured Article: How Can You Protect Yourself From ‘Identity Theft’?

With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, plus how to reduce the risk of having your identity stolen and used for fraud.

What Are Identity Theft and Identity Fraud? 

Identity theft is when personal details of a living or deceased person are stolen e.g., name, date of birth, current or previous addresses, with the intention to commit identity fraud.

Identity fraud is when those stolen details are used to commit fraud, i.e. to obtain goods or services by deception. ID fraud may also take the form of a money laundering scheme, e.g. goods being purchased with the victim’s money, delivered to a person involved in the fraud, and then sold on.

How Big Is The Problem? 

There were 226,000 reported cases of identity fraud in the UK in 2021 with the most hit age group for identity fraud being 60+. In fact, 180,000 instances of fraudulent conduct were filed in the first six months of 2021 which was an 11 per cent increase on the previous year.

How Are Personal Details Stolen? 

There is a variety of ways in which identity details are stolen, with the main ones including:

– Common theft, e.g. having personal possessions stolen from pockets, bags, a property, or via snatching incidents, thereby giving criminals access to different forms of your ID.

– Cold calling / Vishing. This involves fraudsters making phone calls, pretending to be a legitimate business, then trying to extract personal details and other financial information during the call.

– Hacking. This could be criminals hacking into a computer or phone to steal details.

– Phishing. Fraudsters often send emails, SMS (smishing), or instant messages that are made to look as though they’ve been sent by trusted companies. These contain a link which goes to a fake website designed to steal details, or an attachment which downloads malware onto the victim’s computer.

– Malware, including keylogging programs, downloaded by emails or on compromised or bogus websites.

– Data breaches, e.g. directly from a data breach, or details purchased from criminal forums on the dark web, and/or shared from other data breaches, or in private exchanges between rogue employees and their handlers or associates.

– From intercepted or stolen statements, e.g. bank statements and other personal correspondence, or personal paperwork recovered from bins.

– From over-sharing on social media.

– Shoulder surfing while paying for goods or at an ATM.

– From card details saved in websites.

How To Tell If Your Identity Has Been Stolen And Used For Fraud 

There are several signs to look out for that could indicate that your identity has been stolen (and perhaps used for fraud) or that you may become a victim of identity theft. These include:

– If you have had important documents stolen, e.g. a passport or driving licence, or bank or utility bills and statements don’t arrive as they normally should.

– Unexplained items / purchases appear on bank or credit card statements.

– If an application for state benefits is made but you are informed you are already claiming.

– Bills or receipts for goods or services arrive that you have not asked for or used.

– Your credit rating suddenly goes down, signalled by a refusal of financial services, credit cards, or loans.

– Letters arrive from solicitors or debt collectors for debts that aren’t yours.

The Effects of ID Theft and ID Fraud 

The effects of ID fraud resulting from ID theft can last months or years, and can include:

– Psychological and emotional effects leading to anxiety, a feeling of violation, disturbed sleep, a sense of powerlessness, grief, and possibly even suicidal feelings from the crime itself and from the financial worries that it may have caused.

– Financial difficulties, which may lead to the need to borrow money (from family or banks and payday loans or credit cards), which could lead to deeper financial difficulties.

– Symptoms of physical illness, e.g. high blood pressure, heart palpitations, fatigue, muscle aches, and more.

Recovering From ID Theft And Fraud 

Recovering from ID theft and fraud can involve:

– Contacting banks, credit card companies, the police, and Action Fraud as soon as the fraud is discovered. As soon as credit card companies are informed, it can take as little as just one month to recover the stolen credit.

– The need to provide proof to dispute fraudulent bank accounts, loans, and other identity theft. This can involve tracing and detailing your steps at the time of the fraud, e.g. using Google Maps, your calendar, phone, and email records, and more. This can sometimes take months or even years.

– The need to make a list of all banks, loan companies, credit cards, online stores used, and PayPal accounts to check and study them all for any anomalies, both for the time of the fraud itself and going forward.

– The need to incur more costs by taking legal advice and help from a professional who is knowledgeable about (or who specialises in) matters of ID theft and ID fraud.

How To Prevent ID Theft and ID Fraud 

Prevention is better than cure and there are several steps that can be taken to reduce the risk of falling victim to ID theft and fraud. These include:

– Avoid over-sharing or sharing very personal details on social media and avoid social media quizzes that could reveal personal details. Check social media privacy settings to ensure that only trusted people can view your personal posts and be on the lookout for unusual friend requests or messages.

– Be wary of any phishing attempts. For example, don’t click on unsolicited or suspicious emails (or SMS or messages), or click on or download any attachments in them, or click on any links in them (which could lead to phishing sites or malware downloads). Also, be wary of ‘vishing’ phone calls and avoid giving any personal details or account details to people who have called you. If in doubt, ditch the call and phone back on what you know to be the legitimate phone number.

– Regularly check bank and credit card activity and statements for any unusual activity.

– Regularly change passwords and keep all antivirus up to date as well as patching, and security updates. Also, make sure all devices, including the phone, have locking set up, security verification, and trusted anti-virus on them.

– Immediately report any missing statements or personal documents that were expected yet have not arrived plud avoid putting personal documents out with the rubbish, shred them instead.

– Be careful and vigilant at ATMs or other places where ‘shoulder surfing’ could take place.

– Immediately report any theft of personal property that could have ID information, any lost or stolen cards, or similar.

– If moving house, ensure that the new address is given for all personal letters or that a forwarding service (e.g. with Royal Mail) is set up.

What Does This Mean For Your Business? 

Identity theft and ID fraud can happen to anyone because they are a significant and growing problem; there has been a significant increase since 2021. The best protection is taking a ‘less is more’ approach about personal details shared, regular checking of accounts and changing of passwords (and not password sharing), and generally being aware of threats like phishing, vishing, and smishing. Getting into good habits such as shredding documents with personal details and quickly reporting anything out of the ordinary could also help reduce the risks that we all face from increasingly bold and inventive criminals using more technically advanced methods.

Tech Insight : What Are Wi-Fi 5 And 6 … And What’s The Difference??

In this tech-insight, we look at what Wi-Fi 5 And 6 are including their differences plus the improvements that Wi-Fi 6 offers.

Wi-Fi Standards 

Wi-Fi 5 and Wi-Fi 6 are the names of the most recent Wi-Fi standards. Wi-Fi standards are sets of services and protocols that dictate how a Wi-Fi network (and other data transmission networks) acts.

Wi-Fi 5 

Wi-Fi 5, released in 2014, is the previous generation of Wi-Fi technology, which is now being replaced by Wi-Fi 6. Wi-Fi 5 802.11ac technology is a wireless networking standard in the IEEE 802.11 set of protocols. This is part of the Wi-Fi networking family which provides high-throughput wireless local area networks (WLANs) on the 5 GHz band.

Wi-Fi 6 

Wi-Fi 6 802.11ax technology, introduced in 2019, is the new wireless networking standard that is now being used in many more new routers after being initially limited to high-end ones, e.g. Netgear, TP-Link, Asus, and D-Link. Wi-Fi 6 is also now included in more recent mesh network systems (a group of devices that act as a single Wi-Fi network) such as multiple sources of Wi-Fi / ‘points’ around the house.

What Are The Differences? 

Some of the main differences that Wi-Fi 6 offers over Wi-Fi 5 are:

– Maximum potential speeds of up to 40 per cent higher, due to more efficient data encoding.

– A longer battery life for Wi-Fi-enabled devices because the Wi-Fi radio (on the device) will be instructed to spend more time in sleep mode with Wi-Fi 6.

– Better performance in in congested areas where there are a lot of connected devices in operation. This is due to Wi-Fi 6 configuring access points near each other to have different Basic Service Set (BSS) “colours” (a number between 0 and 7).

– A cut in latency (communications ‘lag’).

– The ability to send more data to multiple devices simultaneously. This is because Wi-Fi 6 uses Orthogonal Frequency Division Multiple Access (OFDMA) to divide a wireless channel into a larger number of subchannels. Also, improved Multiple In/Multiple Out (MIMO) lets the access point talk to multiple devices at once, and those devices can respond to the wireless access point at the same time (which did not happen with 5).

– Better Wi-Fi signal reception in devices due to Improved ‘beamforming’, i.e. the focusing a Wi-Fi signal in a specific direction. This means that instead of simply beaming-out a Wi-Fi signal in all directions, Wi-Fi 6 allows the router to determine where a device is and send a stronger signal in that direction.

What Does This Mean For Your Business? 

Wi-Fi 6 essentially offers businesses a faster Wi-Fi speed, plus the ability to improve performance in environments where there are multiple devices, e.g. offices. This could translate into time savings, improvements in productivity and scalability, and a better all-round Wi-Fi experience. However, to reap the full benefits, it’s important to remember that to get Wi-Fi 6 performance on your device, you’ll need both a wireless router and a device that supports Wi-Fi 6. Connecting to a device that only supports Wi-Fi 5 with a Wi-Fi 6 router will still only deliver Wi-Fi 5 performance. However, more devices and routers are now being made to support Wi-Fi 6 which means, when routers and devices are replaced with the latest models, businesses will be able to enjoy the considerable benefits of Wi-Fi 6.

Sustainability-In-Tech : New Ultrafast Saltwater Purification Device

Researchers at the University of Tokyo have developed a device that can desalinate water at least one thousand times faster than existing methods.

A Membrane Made From Tiny Fluorine-Based Nanoscopic Rings 

Scientists at the Tokyo School of Engineering’s Department of Chemistry and Biotechnology constructed tiny fluorine-based nanoscopic rings that were coated with a hydrophobic surface of a dense molecular bond of carbon and fluorine. The fluorine was chosen because of how well it contributes to the water repellent properties of Teflon coatings e.g., on pans. The tiny rings, at 0.9 to two nanometers, much smaller than a human hairs strand which is 100,000-nanometer size, were stacked to create an impermeable lipid membrane.

Amazing Test Results 

In large and small-scale tests of passing seawater through the membranes, they were not only found to perfectly reject salt molecules but did so a thousand times faster compared to the conventional industrial machines, and 2,400 times faster compared to the hypothetical carbon nanotube desalination devices.

Technology – Computer Simulations 

The scientists first used computer simulations to predict and gauge how effective such a membrane would be in cleansing water and the real tests confirmed the success that the simulations predicted.

Applications 

Given that water covers 70 per cent of earth, but only around 3 per cent of earth’s water is freshwater and, of that, only around 1.2 per cent can be used as drinking water, a fast, effective desalination device could be very helpful. For example, this technology could help getting fresh water more quickly to more areas where there is a shortage or hazardous supplies (drinking water accessibility) and could help with agriculture and habitat protection. The abundance of seawater makes it a sustainable solution where the system (as in this case) is not energy-hungry or doesn’t have a big effect in the surrounding environment.

Uses Less Energy 

Another positive aspect of the membrane-based system is that it requires less energy to operate than other desalination systems and is easy to use. The Tokyo University scientists who developed the system also anticipate being able to make much larger membranes to use in industry, and perhaps to develop similar membranes to reduce the carbon dioxide or other undesirable waste products released by industry.

What Does This Mean For Your Organisation? 

There are large areas of the world where fresh water and drinking water are in short supply and this problem may become even worse with global warming. Being able to use an energy-efficient, effective, easy to use, and much faster system than existing desalination methods could bring real benefits to those areas in terms of basic living necessities, agriculture, habitat protection, and business. The system’s potential to be modified to help reduce industrial carbon emissions is also very promising from an environmental perspective. This project also illustrates the importance of computer simulations, models, and digital twins in speeding-up and getting a better understanding of the viability and likely performance of innovations and products before committing to building them, and to help pre-test potential changes in a cost-effective way. Technology such as simulations and models are, therefore, now an important contributor to getting sustainable ideas more quickly to market for the benefit of all.

Security Stop-Press : Warning Over Amazon’s Human Voice Mimicking Plans For Alexa

A Global Cybersecurity Advisor at ESET has warned that Amazon’s plans to enable the Alexa voice assistant to mimic human voices (dead or alive) could be used to launch deep fake audio attacks on some voice authentication security systems. The advice from some security experts is that, if Amazon goes ahead with voice mimicking for Alexa, it may be wise to switch from using voice authenticate e.g., for bank accounts to another verification method such as online banking via a smartphone.

Tech Tip – How To Colour Code Your Outlook Calendar

If you’d like to get more at-a-glance organisation and track all items related to a project or task in your Microsoft Outlook calendar, colour-coding can help. Here’s how to add it:

– From the main calendar view, right click on an appointment, meeting, or event in your calendar, select ‘Categorize’ and select a colour category.

– From an open appointment, meeting, or event, look for the ‘Categorize’ button on the ribbon, in the ‘Tags’ group.

– For more categories or to create a new category, click on ‘All Categories’ to open the ‘Colour Categories’ dialog box, and select the check box next to the colour category.