Data Breach Exposes Thousands of Job Seeker CVs Citing Top Secret Government Work

Thousands of files containing the personal information and expertise of Americans with classified and up to Top Secret security clearances have been exposed by an unsecured Amazon server, potentially for most of the year.
Thousands of files containing the personal information and expertise of Americans with classified and up to Top Secret security clearances have been exposed by an unsecured Amazon server, potentially for most of the year.

The files have been traced back to TigerSwan, a North Carolina-based private security firm. But in a statement on Saturday, TigerSwan implicated TalentPen, a third-party vendor apparently used by the firm to process new job applicants.
Found on an insecure Amazon S3 bucket without the protection of a password, the cache of roughly 9,400 documents reveal extraordinary details about thousands of individuals who were formerly and may be currently employed by the US Department of Defense and within the US intelligence community.

Other documents reveal sensitive and personal details about Iraqi and Afghan nationals who have cooperated and worked alongside US military forces in their home countries, according to the security firm who discovered and reviewed the documents. Between 15 and 20 applicants reportedly meet this criteria.
Many of the files are timestamped and indicate that they were uploaded to the server in mid-February. Gizmodo has yet to confirm for how long the data was left publicly accessible, information only accessible to Amazon and the server’s owner.

“A cursory examination of some of the exposed resumes indicates not merely the varied and elite caliber of many of the applicants as experienced intelligence and military figures, but sensitive, identifying personal details,” UpGuard said in a statement.

Source: Data Breach Exposes Thousands of Job Seekers Citing Top Secret Government Work [Updated]

Facebook has mapped populations in 23 countries as it explores satellites to expand internet – it knows where you live!

Facebook doesn’t only know what its 2 billion users “Like.”

It now knows where millions of humans live, everywhere on Earth, to within 15 feet.

The company has created a data map of the human population by combining government census numbers with information it’s obtained from space satellites, according to Janna Lewis, Facebook’s head of strategic innovation partnerships and sourcing. A Facebook representative later told CNBC that this map currently covers 23 countries, up from 20 countries mentioned in this blog post from February 2016.

The mapping technology, which Facebook says it developed itself, can pinpoint any man-made structures in any country on Earth to a resolution of five meters.

Facebook is using the data to understand the precise distribution of humans around the planet.

That will help the company determine what types of internet service — based either on land, in the air or in space — it can use to reach consumers who now have no (or very low quality) internet connections.

Source: Facebook has mapped populations in 23 countries as it explores satellites to expand internet

Whilst an impressive feat, it’s pretty damn scary big brother wise!

Millions of Time Warner Cable Customer Records Exposed in Third-Party Data Leak

Roughly four million records containing the personal details of Time Warner Cable (TWC) customers were discovered stored on an Amazon server without a password late last month.

The files, more than 600GB in size, were discovered on August 24 by the Kromtech Security Center while its researchers were investigating an unrelated data breach at World Wrestling Entertainment. Two Amazon S3 buckets were eventually found and linked to BroadSoft, a global communications company that partners with service providers, including AT&T and TWC.
he leaked data included usernames, emails addresses, MAC addresses, device serial numbers, and financial transaction information
Other databases revealed billing addresses, phone numbers, and other contact info for at least hundreds of thousands of TWC subscribers. The servers also contained a slew of internal company records, including SQL database dumps, internal emails, and code containing the credentials to an unknown number of external systems..
CCTV footage, presumably of BroadSoft’s workers in Bengaluru, India—where the breach is believed to have originated—was also discovered on the Amazon bucket.

Source: Millions of Time Warner Cable Customer Records Exposed in Third-Party Data Leak


Google Does No Evil – unless you criticise it!

The story in the New York Times this week was unsettling: The New America Foundation, a major think tank, was getting rid of one of its teams of scholars, the Open Markets group. New America had warned its leader Barry Lynn that he was “imperiling the institution,” the Times reported, after he and his group had repeatedly criticized Google, a major funder of the think tank, for its market dominance.
I published a story headlined, “Stick Google Plus Buttons On Your Pages, Or Your Search Traffic Suffers,” that included bits of conversation from the meeting.

The Google guys explained how the new recommendation system will be a factor in search. “Universally, or just among Google Plus friends?” I asked. ‘Universal’ was the answer. “So if Forbes doesn’t put +1 buttons on its pages, it will suffer in search rankings?” I asked. Google guy says he wouldn’t phrase it that way, but basically yes.
Google never challenged the accuracy of the reporting. Instead, a Google spokesperson told me that I needed to unpublish the story because the meeting had been confidential, and the information discussed there had been subject to a non-disclosure agreement between Google and Forbes. (I had signed no such agreement, hadn’t been told the meeting was confidential, and had identified myself as a journalist.)

It escalated quickly from there. I was told by my higher-ups at Forbes that Google representatives called them saying that the article was problematic and had to come down. The implication was that it might have consequences for Forbes, a troubling possibility given how much traffic came through Google searches and Google News.

Source: Yes, Google Uses Its Power to Quash Ideas It Doesn’t Like—I Know Because It Happened to Me

It ends up with the story being taken down and being scrubbed quickly from Google search…

Large diet study suggests it’s carbs, not fats, that are bad for your health

A large, 18-country study may turn current nutritional thinking on its head.

The new research suggests that it’s not the fat in your diet that’s raising your risk of premature death, it’s too many carbohydrates — especially the refined, processed kinds of carbs — that may be the real killer.

The research also found that eating fruits, vegetables and legumes can lower your risk of dying prematurely. But three or four servings a day seemed to be plenty. Any additional servings didn’t appear to provide more benefit.

What does all this mean to you? Well, a cheeseburger may be OK to eat, and adding lettuce and tomato to the burger is still good for you, but an excess of white flour burger buns may boost your risk of dying early.

People with a high fat intake — about 35 percent of their daily diet — had a 23 percent lower risk of early death and 18 percent lower risk of stroke compared to people who ate less fat, said lead author Mahshid Dehghan. She’s an investigator with the Population Health Research Institute at McMaster University in Ontario.

The researchers also noted that a very low intake of saturated fats (below 3 percent of daily diet) was associated with a higher risk of death in the study, compared to diets containing up to 13 percent daily.

At the same time, high-carb diets — containing an average 77 percent carbohydrates — were associated with a 28 percent increased risk of death versus low-carb diets, Dehghan said.

Source: Large diet study suggests it’s carbs, not fats, that are bad for your health

Uber riders can choose not to be tracked after they are dropped off

In response to a chorus of complaints from its users, Uber is revamping privacy settings that it rolled out last fall.

Beginning this week, Uber riders using the iOS version of the ride-hailing company’s app will find a new series of privacy prompts that includes the ability to deny Uber the right to track your whereabouts. Uber is working on similar tweaks to the Android version of its app.

The new options for Uber app users are: Always (Uber is allowed to collect rider location information from the moment the app is opened until the trip ends), While Using The App (information flows to Uber while the app is visible on the screen) and Never (no info is transmitted but riders have to manually input their pick-up and drop-off locations).

One of the old privacy features that gave many users pause was Uber’s ability to track the whereabouts of riders up to 5 minutes after a ride was completed.

Uber says the 5-minute feature was never activated on the iOS version of its app, and that it was disabled a few months after being initiated on the Android version.

Source: Uber riders can make their trips more private

Experts excited by brain ‘wonder-drug’ – BBC News

Scientists hope they have found a drug to stop all neurodegenerative brain diseases, including dementia.In 2013, a UK Medical Research Council team stopped brain cells dying in an animal for the first time, creating headline news around the world.But the compound used was unsuitable for people, as it caused organ damage.Now two drugs have been found that should have the same protective effect on the brain and are already safely used in people.”It’s really exciting,” said Prof Giovanna Mallucci, from the MRC Toxicology Unit in Leicester.She wants to start human clinical trials on dementia patients soon and expects to know whether the drugs work within two to three years.

Source: Experts excited by brain ‘wonder-drug’ – BBC News

An A.I. Says There Are Six Main Kinds of Stories

That’s what a group of researchers, from the University of Vermont and the University of Adelaide, set out to do. They collected computer-generated story arcs for nearly 2,000 works of fiction, classifying each into one of six core types of narratives (based on what happens to the protagonist):

1. Rags to Riches (rise)

2. Riches to Rags (fall)

3. Man in a Hole (fall then rise)

4. Icarus (rise then fall)

5. Cinderella (rise then fall then rise)

6. Oedipus (fall then rise then fall)

Their focus was on the emotional trajectory of a story, not merely its plot. They also analyzed which emotional structure writers used most, and how that contrasted with the ones readers liked best, then published a preprint paper of their findings on the scholarship website More on that in a minute.

First, the researchers had to find a workable dataset. Using a collection of fiction from the digital library Project Gutenberg, they selected 1,737 English-language works of fiction between 10,000 and 200,000 words long. 

Source: An A.I. Says There Are Six Main Kinds of Stories

NASA Image and Video Library

The entire NASA image and video library is now searchable online!

NASA Image and Video Library

Source: NASA Image and Video Library

Make money with open source

Further on my preachings on making money from open source (see video), it turns out that there is a Fair Source license already available on Github

Not open source. Not closed source. The Fair Source License allows everyone to see the source code and makes the software free to use for a limited number of users in your organization. It offers some of the benefits of open source while preserving the ability to charge for the software.

re:Work / Google best business practices

re:Work is organized around some of the biggest ways you can make an impact in your workplace. Each subject contains guides, with tools and insights, for addressing specific challenges.

Source: re:Work

They look at Hiring, managers, people analytics and unbiasing. A treasure trove of business data.

Intel ME controller chip can be disabled after all – for governments

Security researchers at Moscow-based Positive Technologies have identified an undocumented configuration setting that disables Intel Management Engine 11, a CPU control mechanism that has been described as a security risk.

Intel’s ME consists of a microcontroller that works with the Platform Controller Hub chip, in conjunction with integrated peripherals. It handles much of the data travelling between the processor and external devices, and thus has access to most of the data on the host computer.

If compromised, it becomes a backdoor, giving an attacker control over the affected device.

Source: Intel ME controller chip has secret kill switch

Smart home IoT stuff gives away a lot of your personal patterns

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic – reveals that even when data from devices is encrypted, the metadata can help identify both the device and what it is signaling.

Some devices such as the Nest indoor camera directly communicate with identifiable domain names – in this case ‘’ That immediately identifies what the product is, and it is then possible to infer from that and the resulting signal what is happening: whether it has detected motion or whether it is live streaming.

Likewise the Sense sleep monitor, TP‑Link smart plug, and Amazon Echo. Even when the devices communicate with a generic DNS server – like Amazon’s AWS service – they typically have a specific IP address that can be used to identify the sensor (the Belkin WeMo switch for example communicated with the very-specific address).

By digging into each device’s signal, the team was able to figure out with some certainty exactly what was happening: someone was waking up, someone was turning on a light switch, someone had walked into the kitchen, and so on.

Source: How the CIA, Comcast can snoop on your sleep patterns, sex toy usage

Inside the Massive 711 Million Record Onliner Spambot Dump

Last week I was contacted by someone alerting me to the presence of a spam list. A big one. That’s a bit of a relative term though because whilst I’ve loaded “big” spam lists into Have I been pwned (HIBP) before, the largest to date has been a mere 393m records and belonged to River City Media. The one I’m writing about today is 711m records which makes it the largest single set of data I’ve ever loaded into HIBP. Just for a sense of scale, that’s almost one address for every single man, woman and child in all of Europe. This blog posts explains everything I know about it.

Source: Inside the Massive 711 Million Record Onliner Spambot Dump

Hit App Sarahah Quietly Uploads Your Address Book

Sarahah, a new app that lets people sign up to receive anonymized, candid messages, has been surging in popularity; somewhere north of 18 million people are estimated to have downloaded it from Apple and Google’s online stores, making it the No. 3 most downloaded free software title for iPhones and iPads.

Sarahah bills itself as a way to “receive honest feedback” from friends and employees. But the app is collecting more than just feedback messages. When launched for the first time, it immediately harvests and uploads all phone numbers and email addresses in your address book. Although Sarahah does in some cases ask for permission to access contacts, it does not disclose that it uploads such data, nor does it seem to make any functional use of the information.

Zachary Julian, a senior security analyst at Bishop Fox, discovered Sarahah’s uploading of private information when he installed the app on his Android phone, a Galaxy S5 running Android 5.1.1. The phone was outfitted with monitoring software, known as Burp Suite, which intercepts internet traffic entering and leaving the device, allowing the owner to see what data is sent to remote servers. When Julian launched Sarahah on the device, Burp Suite caught the app in the act of uploading his private data.

“As soon as you log into the application, it transmits all of your email and phone contacts stored on the Android operating system,” he said. He later verified the same occurs on Apple’s iOS, albeit after a prompt to “access contacts,” which also appears in newer versions of Android. Julian also noticed that if you haven’t used the application in a while, it’ll share all of your contacts again. He did some testing of the app on a Friday night, and when he booted the app on a Sunday morning, it pushed all of his contacts again.

Source: Hit App Sarahah Quietly Uploads Your Address Book

The callous way companies like this, Sonos, Uber, Google, Microsoft etc etc etc handle your privacy like it’s dogshit is completely incredible.

‘Data is the new oil’: Your personal information is now the world’s most valuable commodity

What “the big five” are selling — or not selling, as in the case of free services like Google or Facebook — is access. As we use their platforms, the corporate giants are collecting information about every aspect of our lives, our behaviour and our decision-making. All of that data gives them tremendous power. And that power begets more power, and more profit.

On one hand, the data can be used to make their tools and services better, which is good for consumers. These companies are able to learn what we want based on the way we use their products, and can adjust them in response to those needs.

“It enables certain companies with orders of magnitude more surveillance capacity than rivals to develop a 360-degree view of the strengths and vulnerabilities of their suppliers, competitors and customers,” says Frank Pasquale, professor of law at the University of Maryland and author of Black Box Society.

Access to such sweeping amounts of data also allows these giants to spot trends early and move on them, which sometimes involves buying up a smaller company before it can become a competitive threat. Pasquale points out that Google/Alphabet has been using its power “to bully or take over rivals and adjacent businesses” at a rate of about “one per week since 2010.”

But it’s not just newer or smaller tech companies that are at risk, says Taplin. “When Google and Facebook control 88 per cent of all new internet advertising, the rest of the internet economy, including things like online journalism and music, are starved for resources.”

Traditionally, this is where the antitrust regulators would step in, but in the data economy it’s not so easy. What we’re seeing for the first time is a clash between the concept of the nation state and these global, borderless corporations.

Source: ‘Data is the new oil’: Your personal information is now the world’s most valuable commodity

AccuWeather caught sending user location data — even when location sharing is off

Security researcher Will Strafach intercepted the traffic from an iPhone running the latest version of AccuWeather and its servers and found that even when the app didn’t have permission to access the device’s precise location, the app would send the Wi-Fi router name and its unique MAC address to the servers of data monetization firm Reveal Mobile every few hours. That data can be correlated with public data to reveal an approximate location of a user’s device.

We independently verified the findings, and were able to geolocate an AccuWeather-running iPhone in our New York office within just a few meters, using nothing more than the Wi-Fi router’s MAC address and public data.

Source: AccuWeather caught sending user location data — even when location sharing is off

Around the same time Sonos is ignoring privacy as well, it looks like everyone is basically just taking the piss with your privacy.

Towards quantum communications in free-space seawater

Here we experimentally demonstrate that polarization quantum states including general qubits of single photon and entangled states can survive well after travelling through seawater. We perform experiments with seawater collected over a range of 36 kilometers in the Yellow Sea. For single photons at 405 nm in a blue-green window, we obtain an average process fidelity above 98%

The Optical Society

Pirate Bay Founders Ordered to Pay Music Labels $477,000

Two founders of The Pirate Bay have been ordered by a court in Finland to pay record labels more than $477,000 in compensation. Fredrik Neij and Gottfrid Svartholm were found liable for ongoing copyright breaches on the site. Neither appeared to mount a defense so both were found guilty in their absence.

In November 2011, the International Federation of the Phonographic Industry (IFPI), with support from Finnish anti-piracy group Copyright Information and Anti-Piracy Center (CIAPC), filed a lawsuit in the Helsinki District Court against The Pirate Bay.

IFPI, which represents the world’s major labels, demanded that the site’s operators stop facilitating the unauthorized distribution of music and pay compensation to IFPI and CIAPC-affiliated rightsholders for the damages caused through their website.

Progress in the case has been somewhat glacial but this morning, almost six years after the complaint was first filed, a decision was handed down.

Source: Pirate Bay Founders Ordered to Pay Music Labels $477,000 – TorrentFreak

The law is insane – why has Google not been sued to this extent? So the labels get a load of money: how will they divide this amongst their artists? I think the answer is NOT.

Mini-antennas 100,000 x more efficient, could be used for brain interface machinery, anything tiny.

Antennas receive information by resonating with EM waves, which they convert into electrical voltage. For such resonance to occur, a traditional antenna’s length must roughly match the wavelength of the EM wave it receives, meaning that the antenna must be relatively big. However, like a guitar string, an antenna can also resonate with acoustic waves. The new antennas take advantage of this fact. They will pick up EM waves of a given frequency if its size matches the wavelength of the much shorter acoustic waves of the same frequency. That means that that for any given signal frequency, the antennas can be much smaller.

The trick is, of course, to quickly turn the incoming EM waves into acoustic waves. To do that, the two-part antenna employs a thin sheet of a so-called piezomagnetic material, which expands and contracts when exposed to a magnetic field. If it’s the right size and shape, the sheet efficiently converts the incoming EM wave to acoustic vibrations. That piezomagnetic material is then attached to a piezoelectric material, which converts the vibrations to an oscillating electrical voltage. When the antenna sends out a signal, information travels in the reverse direction, from electrical voltage to vibrations to EM waves. The biggest challenge, Sun says, was finding the right piezomagnetic material—he settled on a combination of iron, gallium, and boron—and then producing it at high quality.

The team created two kinds of acoustic antennas. One has a circular membrane, which works for frequencies in the gigahertz range, including those for WiFi. The other has a rectangular membrane, suitable for megahertz frequencies used for TV and radio. Each is less than a millimeter across, and both can be manufactured together on a single chip. When researchers tested one of the antennas in a specially insulated room, they found that compared to a conventional ring antenna of the same size, it sent and received 2.5 gigahertz signals about 100,000 times more efficiently, they report today in Nature Communications.

Source: Mini-antennas could power brain-computer interfaces, medical devices | Science | AAAS

Sonos strongarms customers into giving up privacy, or hardware stops working. Here’s how to to Stop Your Sonos From Collecting (As Much) Personal Data

Bad news, Sonos customers: to lay the groundwork for its upcoming voice assistant support, the company is asking users to agree to an updated privacy policy, one that includes both mandatory data collection rules and a mention about future device functionality. Should you disagree with said policy update, your device’s basic functions could stop working, according to Consumerist.

Source: How to Stop Your Sonos From Collecting (As Much) Personal Data

In a blog post, Sonos claimed the update was necessary to “improve your listening experience” and identify issues by analyzing collected error information. Its earlier privacy policy (you can check it out here) allowed users to choose whether or not they wanted to register their device with Sonos for data collection. The new one says that opting out of “Functional Data collection” is not an option.
Data Collection is Mandatory

Data collected previously included information about equalizer usage, playback errors, and time spent listening to local or streaming music. Its new privacy policy, however, collects what the company is calling “Functional Data,” information Sonos claims is “absolutely necessary for your Sonos System to perform its basic functions in a secure way.” Functional Data includes personal information like location data, IP addresses, and more:

Registration data:

This data includes your email address, location, language preference, Product serial number, IP address, and Sonos account login information (as described above).

System data:

This data includes things like product type, controller device type, operating system of controller, software version information, content source (audio line in), signal input (for example, whether your TV outputs a specific audio signal such as Dolby to your Sonos system), information about wifi antennas, audio settings (such as equalization or stereo pair), Product orientation, room names you have assigned to your Sonos Product, whether your product has been tuned using Sonos Trueplay technology, and error information.

Sonos is also trying to collect performance and activity information shown below, otherwise known as Additional Usage Data:

Performance Information:

This includes things like temperature of your Product, Wi-Fi information such as signal strength, what music services you have connected to your Sonos system (including, for some services, your login username – but not password – for such service), information about how often you use the Sonos app versus another control mechanism, flow of interactions within the Sonos app, how often you use the physical controls on the unit, and location data when the Sonos app is in use, and duration of Sonos Product use.

Activity Information:

This includes duration of music service use, Product or room grouping information; command information such as play, pause, change volume, or skip tracks; information about track, playlist, or station container data; and Sonos playlist or Sonos favorites information; each correlated to individual Sonos Products.

How to (Partially) Protect Yourself

For now, as long as you don’t enable voice assistant support, you can opt out of sharing the aforementioned Additional Usage Data with Sonos by adjusting some settings in your apps.

Sonos for iOS or Android:

From the Sonos music menu, tap Settings.
Tap Advanced Settings.
Tap Usage Data then Turn off Usage Data Sharing.

Sonos for Mac:

From the menu bar at the top of your screen click Sonos then Preferences.
On the left side of the window, click Advanced.
Click Improve Sonos.
Check the box that reads Turn usage data sharing off.

Sonos for PC:

From the menu bar at the top of the Sonos app click Manage then Settings.
On the left side of the window, click Advanced.
Click Improve Sonos.
Check the box that reads Turn usage data sharing off.

If you’re concerned about the data Sonos may have already collected, you can edit or delete it by accessing your Sonos account online or going through the Sonos app, though deleting personal data could render your Sonos device useless. You can also shoot Sonos an email and ask them to delete your personal data, if you’re into that.

And the US high courts still say that accepting these kind of terms of service is legal. Sonos hardware is expensive and forcing people to change the terms of their use after the financial investment makes it even worse than the disgrace that this kind of behavior is already.

Buying a new Monitor / TV

When buying a new monitor there are 5 sites you should have open at all times:
1. The site selling monitors (eg
2. The comparison site Display specifications which allows you to search for models, add them to comparison lists and then view detailed specifications next to each other
3. A google search for the reviews of the model
4. AV Forums to search for good or bad experiences with the model.
5. Your price comparison site (eg Tweakers Pricewatch

Also useful are sites that tell you what each model means, how the model number is built up. For Samsung you can use This site

The important specifications are:
What type of panel is it? (IPS / VA / PQL / etc)

Panel bit depth: is it 8 bits, 10 bits native or 10 bits (8 bits + FRC)

Colour bit depth: 30 bits?

Resolution: native UHD 3840×2160 pixels

Pixel density: higher is better

Display area: bigger is better

Static contrast: more is better

Response times (minimum / average) and input lag (for gaming): less is better

3D: if you think that’s important

frequency: most are 60Hz, some are 120Hz (higher is better)

Interpolation value: most are around 1200, higher is better

Power consumption: less is better

Other features: connectivity (what kind of USB ports (3.0?) etc fit in), sizes, colour, stand size at the back, network (does it do 802.11n 5G and 802.11ac?), features (does it have a good 4k upscaler, how black is black, what kind of colour enhancements does it have), etc.

Good luck!

Amazons Macie detects data leaks in S3 buckets using AI

Think of Macie as a data loss prevention agent, a DLPbot, that uses machine learning to understand a user’s pattern of access to data in S3 buckets. The buckets have permission levels and the data in a bucket can be ranked for sensitivity or risk, using items such as credit card numbers, and other sensitive personal information.

The software monitors users’ behaviour and profiles it. If there are changes in the pattern of that behaviour and they are directed towards high-risk data then Macie can alert admin staff to a potential breach risk.

For example, if a hacker successfully impersonates a valid user and then goes searching for data in unexpected places and/or from an unknown IP address then Macie can flag this unusual pattern of activity. The product could also identify a valid employee going rogue, say, generating a store of captured data ready to steal it.

Source: If there’s a hole in your S3 bucket, data thieves will be sprayed by Macie

Bitcoin-accepting sites leave cookie trail that crumbles anonymity

Of the 130 sites the researchers checked:

In total, 107 sites leaked some kind of transaction information;
31 allowed third-party scripts to access users’ Bitcoin addresses;
104 shared the non-BTC denominated price of a transaction; and
30 shared the transaction price in Bitcoin.

It doesn’t help that even for someone running tracking protection, a substantial amount of personal information was passed around by the sites examined in the study.
Information type With tracking protection Without protection
E-mail 32 25
First name 27 20
Last name 25 19
User ID 15 12
Address 13 9
Full name 11 4
Phone 10 4
Company 5 4

A total of 49 merchants shared users’ identifying information, and 38 shared that even if the user tries to stop them with tracking protection.

Users have very little protection against all this, the paper says: the danger is created by pervasive tracking, and it’s down to merchants to give users better privacy.

Source: Bitcoin-accepting sites leave cookie trail that crumbles anonymity

Data Viz Project | Collection of data visualizations to get inspired and finding the right type.

Collection of data chart and graph visualizations to get inspired and finding the right type.

Source: Data Viz Project | Collection of data visualizations to get inspired and finding the right type.

different data chart and graph types

different data chart and graph types

Skip to toolbar