New Release: Tor Browser 8.5a6

New Release: Tor Browser 8.5a6

Tor Browser 8.5a6 is the first version that is built reproducibly for Android devices and is localized in all locales the desktop platforms support. Downloading files on newer Android devices crashes Tor Browser. The full changelog since Tor Browser 8.5a5 is:

How to Use a VPN to Improve Security on Your Android Device

How to Use a VPN to Improve Security on Your Android Device

Since Android doesn’t offer inbuilt support for OpenVPN, you’ll need to use this app. While Android doesn’t offer inbuilt support for OpenVPN, it does let you connect to PPTP and L2TP.

Google CEO Sundar Pichai thinks Android users know how much their phones are tracking them

Google CEO Sundar Pichai thinks Android users know how much their phones are tracking them

Further in the hearing, Pichai was asked if Google could improve its user dashboard and tools to better teach people how to protect their privacy, including turning off data collection and location tracking.

New Release: Tor Browser 8.0.4

New Release: Tor Browser 8.0.4

Tor Browser 8.0.4 contains updates to Tor (0.3.4.9), OpenSSL (1.0.2q) and other bundle components. setting back the sandboxing level to 5 on Windows (the Firefox default), after working around some Tor Launcher interference causing a broken Tor Browser experience.

If you care about your privacy, try these special versions of Firefox

If you care about your privacy, try these special versions of Firefox

Both Beta and Nightly are available for Android devices, but there’s an easier option for maximum privacy and security on all phones and tablets: A special mobile browser called Firefox Focus.

Cambridge City Council passes surveillance oversight ordinance in unanimous vote

Cambridge City Council passes surveillance oversight ordinance in unanimous vote

Last night, the Cambridge City Council unanimously voted to approve an ordinance requiring community control over police surveillance. The passage of the ordinance last night was the culmination of over two years of work by the ACLU, Cambridge residents, the City, and members of the City Council.

Tails 3.11 is out

This release fixes many security vulnerabilities. Upgrades and changes Add a confirm dialog between downloading and applying an automatic upgrade to control better when the network is disabled and prevent partially applied upgrades. Update Thunderbird to 60.3.0. Download Tails 3.11.

Facebook Filed A Patent To Calculate Your Future Location

Facebook Filed A Patent To Calculate Your Future Location

Facebook’s app says it collects your current location data in order to “provide more relevant and personalized experiences” right now, like serving you localized advertising or helping you use its check-in feature, which allows you to post about different businesses you’re visiting.

With 52.5 Million Users' Data Exposed On Google+, Google Quickens Shutdown

With 52.5 Million Users' Data Exposed On Google+, Google Quickens Shutdown

The Google+ social network inadvertently gave app developers access to about 52.5 million users' information — even data not meant to be public — because of a bug in its software, Google says.

Microsoft Posts List Of Facial Recognition Tech Guidelines It Thinks The Government Should Make Mandatory

Microsoft Posts List Of Facial Recognition Tech Guidelines It Thinks The Government Should Make Mandatory

It clarified that Microsoft was not actually providing facial recognition tech to the agency and laid out a number of ground rules the company felt would best serve everyone going forward. Microsoft's Brad Smith again addresses the positives and negatives of facial recognition tech, especially when it's deployed by government agencies.

What the Experts Say about 2018’s Worst Security Breaches

Earlier in the year, it was revealed that the company also allowed a third-party application (Cambridge Analytica) to take the data of over 80 million users, which, though less technical than other hacks, was still significant.

“Do no harm” in the digital age: Privacy and security cannot be ignored

“Do no harm” in the digital age: Privacy and security cannot be ignored

As explored in our new report with the International Committee of the Red Cross - The humanitarian metadata problem: ‘Doing no harm’ in the digital era, metadata is generated by humanitarian organisations as they coordinate responses, communicate with staff, and engage with the people they serve.

Development and Humanitarian Sector

Development and Humanitarian Sector

There is no question that advancements in technology, communications and data-intensive systems have significantly changed the way development programmes are delivered and humanitarian assistance can be provided to ensure more people can benefit, more rapidly and more effectively.

Exposing Aiding Surveillance: Raising the cause of the world’s most vulnerable people’s

Under pressure to be more accountable for their use of resources, but also due to the post-9/11 push to track and identify terrorists across the world, the humanitarian and development sectors began increasingly to look to identity registration, including biometrics, and the collection and sharing of vast amounts of data on their beneficiaries.

Profiling and Automated Decision Making: Is Artificial Intelligence Violating Your Right to Privacy?

Profiling and Automated Decision Making: Is Artificial Intelligence Violating Your Right to Privacy?

As the UN High Commissioner for Human Rights noted in August 2018 “big data analytics and artificial intelligence increasingly enable States and business enterprises to obtain fine-grained information about people’s lives, make inferences about their physical and mental characteristics and create detailed personality profiles.”

Google+ to shut down early after privacy flaw affects over 50m users

Google+ to shut down early after privacy flaw affects over 50m users

A privacy flaw that inadvertently exposed the names, email addresses, ages and other personal information of 52.5 million Google+ users last month convinced Google to close the service in April instead of August, as previously announced.

Telegram, WhatsApp and Signal open to side-channel attacks

Telegram, WhatsApp and Signal open to side-channel attacks

Researchers at Cisco's Talos Group are warning users to not to assume that the very popular encrypted messaging apps Telegram, WhatsApp and Signal will keep the communications confidential, as they partly delegate security to the operating systems they run on.

DEA Spy Cameras In Vacuum Cleaners: Surveillance State

DEA Spy Cameras In Vacuum Cleaners: Surveillance State

received a $42,595 contract on November 28 to manufacture a "custom Shop Vac concealment with Canon M50B.” The program completion time is one month, the DEA expects delivery of the spy vacuum on January 01.

Social Justice Organizations Challenge Retention of DNA Collected from Hundreds of Thousands of Innocent Californians

Social Justice Organizations Challenge Retention of DNA Collected from Hundreds of Thousands of Innocent Californians

San Francisco - Two social justice organizations—the Center for Genetics and Society and the Equal Justice Society—and an individual plaintiff, Pete Shanks, have filed suit against the state of California for its collection and retention of genetic profiles from people arrested but never convicted of any crime.

5 Sure Signs You Have Been Hacked

5 Sure Signs You Have Been Hacked

These messages are from hackers, and their goal is to get your friends and family to click links or visit sites where malicious software can automatically infect their devices as well. Data usage that suddenly spikes with no reasonable explanation is another sign that you have been hacked.

Customs officers searching more travelers’ devices

Customs officers searching more travelers’ devices

NEW YORK (AP) — U.S. Customs and Border Protection officers are searching the electronic devices of travelers more often, and did not always follow proper protocol, a new watchdog report has found.

EPIC To Congress: Require Algorithmic Transparency For Google, Dominant Internet Firms

EPIC explained that Google's acquisition of YouTube led to a skewing of search results after Google substituted its secret "relevance" ranking for the original objective ranking, based on hits and ratings. The Commission required Google to change its algorithm to rank its own shopping comparison the same way it ranks its competitors.

Equifax Breach "Entirely Preventable": House Oversight Committee

The House Committee recommended that Equifax "provide more transparency to consumers" about data use and security practices and reduce the use of social security numbers as identifiers, longstanding priorities of EPIC.

Facebook Well Aware That Tracking Contacts Is Creepy: Emails

Facebook Well Aware That Tracking Contacts Is Creepy: Emails

But thanks likely to this evasion of Android permission requests, Facebook users did not realize for years that the company was collecting information about who they called and texted, which would have helped explain to them why their “People You May Know” recommendations were so eerily accurate.

Understanding a VPN Kill Switch

Understanding a VPN Kill Switch

A kill switch disconnects you from the internet if your VPN connection drops to ensure that your real IP isn’t leaked online. You might be thinking you won’t need a kill switch if the VPN connection doesn’t drop.

Half of the Tor Project's funding now comes from the private sector

Half of the Tor Project's funding now comes from the private sector

"In terms of percentages, while 2015 saw 85% of our funding coming from US government sources, 2016 saw the fraction drop to 76%, and in 2017 we're down to 51%," said Roger Dingledine, co-founder of the Tor Project and original developer of the Tor anonymity software.

Net Neutrality Potentially Gains Powerful Foe in Top Justice Candidate

Net Neutrality Potentially Gains Powerful Foe in Top Justice Candidate

Barr’s appointment would be welcome news for at least three major internet service providers and a trade organization -- including Verizon, AT&T, Comcast, and the National Cable & Telecommunications Association -- that have spent more than $600 million lobbying on Capitol Hill since 2008, according to a MapLight analysis.

Google will shut down Google+ four months early after second data leak

Google+ has suffered another data leak, and Google has decided to shut down the consumer version of the social network four months earlier than it originally planned.

How to Increase Your VPN Speed

How to Increase Your VPN Speed

Some VPN providers let you check the status of their servers so you can find a free one. You can try different VPN protocols (L2TP, OpenVPN etc) with TCP and UDP and find the fastest combination that works for you.

Public slams Finnish Transport Safety Agency for privacy breach

Public slams Finnish Transport Safety Agency for privacy breach

The Finnish Transport Safety Agency (Trafi) on Sunday said it had suspended the service while it investigates whether the tool infringes on people’s data privacy and security.

More