Tag: geolocation
Geolocation of your teenager: a protective or intrusive practice? Our expert’s answer
News Published on 09/27/2024 at 4:07 p.m. updated on 09/27/2024 at 4:07 p.m. Reading 3 min. in collaboration with Amélie Boukhobza (Clinical psychologist) While more and more parents are taking…
The deputies voted for article 3 of the Justice law authorizing the remote activation of microphones and cameras and the geolocation of connected objects. A particularly controversial measure, which raises fears of possible abuses.
The deputies voted for article 3 of the Justice law authorizing the remote activation of microphones and cameras and the geolocation of connected objects. A particularly controversial measure, which raises…
Senators voted for Article 3 of the Justice Law authorizing authorities to remotely activate microphones, cameras and the geolocation of connected objects. A particularly controversial measure, which raises fears of possible abuses.
Senators voted for Article 3 of the Justice Law authorizing authorities to remotely activate microphones, cameras and the geolocation of connected objects. A particularly controversial measure, which raises fears of…
The tax authorities are hunting swimming pools and soon verandas and garden sheds thanks to artificial intelligence
You will also be interested [EN VIDÉO] The largest swimming pool in the world flown over by drone in Chile In Chile, the Algarrobo swimming pool has a beach one…
FindMine, the mine-clearing drone
To find explosives in mined areas, a German-Swiss organization has developed a drone equipped with a radar combined with position sensors to ensure centimeter precision in locating buried landmines. The…
FindMine, here is the deminer drone!
To find explosives in mined areas, a German-Swiss organization has developed a drone equipped with radar combined with position sensors to ensure centimeter precision in locating buried landmines. The drone…
A dead iPhone can be hacked!
You will also be interested [EN VIDÉO] Phishing: what is it and how to prevent it? Phishing, or phishing in English, is a form of spam consisting of impersonating a…
Even turned off, an iPhone can be hacked!
You will also be interested [EN VIDÉO] Phishing: what is it and how to prevent it? Phishing, or phishing in English, is a form of spam consisting of impersonating a…
How mobile telephony became a weapon of war in Ukraine
In Ukraine, each side uses mobile networks to spy on the adversary but also to locate him, to then hit him with a missile. For this, the armies use false…
Geolocation and hunting, a guarantee of security?
Last February a hunter accidentally killed a walker. The accident reopened the debate on a possible ban on hunting on Saturdays and the creation of a mobile application to geo-locate…