Tor Browser 8.5a6 is the first version that is built reproducibly for Android devices and is localized in all locales the desktop platforms support. Downloading files on newer Android devices crashes Tor Browser. The full changelog since Tor Browser 8.5a5 is:
Since Android doesn’t offer inbuilt support for OpenVPN, you’ll need to use this app. While Android doesn’t offer inbuilt support for OpenVPN, it does let you connect to PPTP and L2TP.
Tor Browser 8.0.4 contains updates to Tor (0.3.4.9), OpenSSL (1.0.2q) and other bundle components. setting back the sandboxing level to 5 on Windows (the Firefox default), after working around some Tor Launcher interference causing a broken Tor Browser experience.
Both Beta and Nightly are available for Android devices, but there’s an easier option for maximum privacy and security on all phones and tablets: A special mobile browser called Firefox Focus.
Last night, the Cambridge City Council unanimously voted to approve an ordinance requiring community control over police surveillance. The passage of the ordinance last night was the culmination of over two years of work by the ACLU, Cambridge residents, the City, and members of the City Council.
This release fixes many security vulnerabilities. Upgrades and changes Add a confirm dialog between downloading and applying an automatic upgrade to control better when the network is disabled and prevent partially applied upgrades. Update Thunderbird to 60.3.0. Download Tails 3.11.
Facebook’s app says it collects your current location data in order to “provide more relevant and personalized experiences” right now, like serving you localized advertising or helping you use its check-in feature, which allows you to post about different businesses you’re visiting.
It clarified that Microsoft was not actually providing facial recognition tech to the agency and laid out a number of ground rules the company felt would best serve everyone going forward. Microsoft's Brad Smith again addresses the positives and negatives of facial recognition tech, especially when it's deployed by government agencies.
Earlier in the year, it was revealed that the company also allowed a third-party application (Cambridge Analytica) to take the data of over 80 million users, which, though less technical than other hacks, was still significant.
As explored in our new report with the International Committee of the Red Cross - The humanitarian metadata problem: ‘Doing no harm’ in the digital era, metadata is generated by humanitarian organisations as they coordinate responses, communicate with staff, and engage with the people they serve.
There is no question that advancements in technology, communications and data-intensive systems have significantly changed the way development programmes are delivered and humanitarian assistance can be provided to ensure more people can benefit, more rapidly and more effectively.
Under pressure to be more accountable for their use of resources, but also due to the post-9/11 push to track and identify terrorists across the world, the humanitarian and development sectors began increasingly to look to identity registration, including biometrics, and the collection and sharing of vast amounts of data on their beneficiaries.
As the UN High Commissioner for Human Rights noted in August 2018 “big data analytics and artificial intelligence increasingly enable States and business enterprises to obtain fine-grained information about people’s lives, make inferences about their physical and mental characteristics and create detailed personality profiles.”
A privacy flaw that inadvertently exposed the names, email addresses, ages and other personal information of 52.5 million Google+ users last month convinced Google to close the service in April instead of August, as previously announced.
Researchers at Cisco's Talos Group are warning users to not to assume that the very popular encrypted messaging apps Telegram, WhatsApp and Signal will keep the communications confidential, as they partly delegate security to the operating systems they run on.
San Francisco - Two social justice organizations—the Center for Genetics and Society and the Equal Justice Society—and an individual plaintiff, Pete Shanks, have filed suit against the state of California for its collection and retention of genetic profiles from people arrested but never convicted of any crime.
These messages are from hackers, and their goal is to get your friends and family to click links or visit sites where malicious software can automatically infect their devices as well. Data usage that suddenly spikes with no reasonable explanation is another sign that you have been hacked.
EPIC explained that Google's acquisition of YouTube led to a skewing of search results after Google substituted its secret "relevance" ranking for the original objective ranking, based on hits and ratings. The Commission required Google to change its algorithm to rank its own shopping comparison the same way it ranks its competitors.
The House Committee recommended that Equifax "provide more transparency to consumers" about data use and security practices and reduce the use of social security numbers as identifiers, longstanding priorities of EPIC.
But thanks likely to this evasion of Android permission requests, Facebook users did not realize for years that the company was collecting information about who they called and texted, which would have helped explain to them why their “People You May Know” recommendations were so eerily accurate.
A kill switch disconnects you from the internet if your VPN connection drops to ensure that your real IP isn’t leaked online. You might be thinking you won’t need a kill switch if the VPN connection doesn’t drop.
"In terms of percentages, while 2015 saw 85% of our funding coming from US government sources, 2016 saw the fraction drop to 76%, and in 2017 we're down to 51%," said Roger Dingledine, co-founder of the Tor Project and original developer of the Tor anonymity software.
Barr’s appointment would be welcome news for at least three major internet service providers and a trade organization -- including Verizon, AT&T, Comcast, and the National Cable & Telecommunications Association -- that have spent more than $600 million lobbying on Capitol Hill since 2008, according to a MapLight analysis.
Google+ has suffered another data leak, and Google has decided to shut down the consumer version of the social network four months earlier than it originally planned.
Some VPN providers let you check the status of their servers so you can find a free one. You can try different VPN protocols (L2TP, OpenVPN etc) with TCP and UDP and find the fastest combination that works for you.