Amazon as a Vector

Amazon as a Vector

While platforms like Amazon have cornered markets through long-term investment strategies and developing itself as a utility[9], a central cog in the systems of e-commerce and retail, this doesn’t beget issues of public trust and the increasing complexity from running these multiple lines.

Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

Apple's custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook's built-in microphone whenever the user closes the lid, the company revealed yesterday at its event at the Brooklyn Academy of Music in New York.

Opinion | Tech Companies Say They Care

Opinion | Tech Companies Say They Care

The statement, which today reads like a quaint artifact of a simpler time, would become the company’s first privacy policy — a gently lawyered explanation of how the company collects and distributes its users’ data and information.

Your Smartphone Apps Are Filled With Trackers You Know Nothing About

Your Smartphone Apps Are Filled With Trackers You Know Nothing About

Both of these SDKs allow Facebook and Google to track users beyond their desktop web browsers and automatically collect information like when you installed the app, each time you opened it, and what you purchased.

Startups and the Rise of Digital Identity

Startups and the Rise of Digital Identity

Well, if you want to keep your identity safe from hackers, see people in developing nations open a bank account for the first time, and take control over your personal data—digital identity matters.

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

“5 Surprisingly Easy Ways We Let People Steal Our Identity.” (From our Forums.)

When personal information is fraudulently used to open new accounts, BJS says, people affected experience a lot financial problems in the future. Someone calls you claiming to be from your bank and asks for sensitive personally identifiable information like your social security number.

How to protect kid’s online privacy?

How to protect kid’s online privacy?

The advancement of cell phones and access to the internet enable young teens and children to use social messaging apps all day long. In my opinion, I would suggest you monitor the digital activities of teens using cell phone spy apps.

Victory for Users: WhatsApp Fixes Privacy Problem in Group Messaging

Victory for Users: WhatsApp Fixes Privacy Problem in Group Messaging

San Francisco - In a victory for users, WhatsApp has fixed a long-standing privacy problem in group messaging, where users could be added to a group without their permission.

Facebook finally set to launch Clear History privacy tool

Facebook finally set to launch Clear History privacy tool

When you block someone, they won’t be able to see things you post on your Timeline, tag you, invite you to events or groups, start conversations with you or add you as a friend.

Big Tech is Spying on Us: a collection of articles to freak you out and convince your doubting friends.

Big Tech is Spying on Us: a collection of articles to freak you out and convince your doubting friends.

It's in Big Tech's DNA to spy on us, and the proliferation of IoT / smart home gadgets along with artificial intelligence (AI) algorithms are only going accelerate the problem.

Slack hands over control of encryption keys to regulated customers

Slack hands over control of encryption keys to regulated customers

Slack announced today that it is launching Enterprise Key Management (EKM) for Slack, a new tool that enables customers to control their encryption keys in the enterprise version of the communications app.

Least Authority and Private Internet Access announce PrivateStorage.io: a secure and privacy-focused cloud storage solution.

Least Authority and Private Internet Access announce PrivateStorage.io: a secure and privacy-focused cloud storage solution.

As firm believers in protection of our customers’ privacy, we joined efforts to offer a private, secure and end-to-end encrypted solution to allow the end user — not third-parties — to determine whether and to what extent the personal data on the storage service is collected, shared, and processed.

Web 3.0: The decentralised web promises to make the internet free again

Web 3.0: The decentralised web promises to make the internet free again

But it could also be a decentralised web that challenges the dominance of the tech giants by moving us away from relying so heavily on a few companies, technologies and a relatively small amount of internet infrastructure Peer-to-peer technology When we currently access the web, our computers use the HTTP protocol in the form of web addresses to find information stored at a fixed location, usually on a single server.

Axios AM Deep Dive

Axios AM Deep Dive

The grand bargain of the digital age, in which consumers have traded their data for free services, is coming apart. Be smart: Giving consumers more control of their data also means they'd have to take more responsibility for it and actively manage it, like managing financial accounts.

Serious Chrome zero-day – Google says update “right this minute”

Serious Chrome zero-day – Google says update “right this minute”

DEEP LEARNING FOR DEEPER CYBERSECURITY Watch Video The reason that even the Chrome team are wading in with you’d-better-update warnings is the recent appearance of a zero-day security vulnerability, dubbed CVE-2019-5786, for which Google says it is “aware of of reports that an exploit […] exists in the wild.” To clarify.

Reclaiming privacy: a feminist manifesto

Reclaiming privacy: a feminist manifesto

We need to look at the way patriarchy needs the rigid categorisation of ID systems to impose a binary perspective of gender, how welfare programmes participate in the control and constant monitoring of populations in vulnerable situations, how data exploitation contributes to the expectation that women should look a certain way and seeks to perpetuate traditional gender roles in society, how social surveillance limits the opportunities of women, trans and gender diverse people.

Congress considers a national standard for data privacy

Congress considers a national standard for data privacy

"All Americans have benefited from state privacy and data breach laws, so their role as policy innovator and law enforcer must be respected." In December, a group of 15 Democrats in the Senate introduced a bill called the Data Care Act that would enact new data protections and limit the ways companies can use personal data.

The Dark Sides of Modern Cars: Hacking and Data Collection

The Dark Sides of Modern Cars: Hacking and Data Collection

Munagala said the auto and tech industries realize they must achieve certain benchmarks of security and privacy to fully monetize this wellspring of operational and personal data, collected in real time.

Social Media and Governance: The Disequilibrium of Communication and Commodification

Social Media and Governance: The Disequilibrium of Communication and Commodification

The governing of the interactions of socio-economic spheres have found a new force to contend with in the form of the platform and the social media network, as issues of data management, image control, proprietary rights and arbitration become central to people’s existence on online forums.

I got a data breach alert. What next?

I got a data breach alert. What next?

With access to your email inbox, the perpetrator can reset and change your passwords to all the other online services you use, including Facebook, Netflix and Google. With access to your email inbox, the perpetrator is able to take full control of your online life.

India Proposes Chinese-Style Internet Censorship

India Proposes Chinese-Style Internet Censorship

Mishi Choudhary, founder of SFLC.in, a legal advocacy group in New Delhi, said Indian governments had tried for nearly a decade to exercise more control over internet content but had been restrained by the courts.

I tried to keep my unborn child secret from Facebook and Google

I tried to keep my unborn child secret from Facebook and Google

Our reasons were simple: first, we wanted our child, when it was good and ready, to establish its own online identity; second, we didn’t want to be stalked around the internet by adverts for breast pumps and baby carriers; finally, and most pertinently, we wanted some semblance of control over something that felt deeply personal.

Saudi Arabia: An app to track women

Saudi Arabia: An app to track women

A surveillance system has been set up by the Saudi government to control women and prevent them from fleeing the country, known as the ‘Absher’ application, it allows guardians of women (brothers, husbands, and fathers) to track down their movements.

Your digital identity has three layers, and you can only protect one of them

Your digital identity has three layers, and you can only protect one of them

It is shaped by technology companies and advertisers who make key decisions based on their interpretation of seemingly benign data points: what movies you choose to watch, the time of day you tweet, or how long you take to click on a cat video.

Tails report for December, 2018

Tails report for December, 2018

Part of this work was to switch our IDF format to JSON and to rewrite and release a new version of the Tails verification extension . The translation server (not yet in production) now updates its Git repository automatically using scripts. The staging website (not yet in production either) is updated automatically.

Australian Assistance and Access Bill 2018

Australian Assistance and Access Bill 2018

Blanket Weakening of Encryption IS NOT the way to replace Due Diligence If you don’t know by now, in December 2018 the Australian government with the support of the Australian Labor party passed new legislation that requires technology companies to be able to decrypt and hand over user data, when requested by law enforcement and the public services.

Too big to care? Google and the exploitation of your data

Too big to care? Google and the exploitation of your data

As CNIL notes, users should be given the opportunity to consent to each of the data processing before they are asked to accept terms and conditions or general privacy policy (see paragraph 160 of the decision, French version ).

Apple CEO Tim Cook: It's Time for Action on Data Privacy

Apple CEO Tim Cook: It's Time for Action on Data Privacy

Last year, before a global body of privacy regulators, I laid out four principles that I believe should guide legislation: First, the right to have personal data minimized.

This 'parasite' protects your privacy by feeding smart speakers white noise

This 'parasite' protects your privacy by feeding smart speakers white noise

images courtesy of bjoern karmann project alias is designed to give users more control over their smart assistants, both when it comes to customisation and privacy. through an app users can train alias to react on a custom wake-word/sound, and once trained, alias can take control over your home assistant.

Does Facebook care about your privacy?

Does Facebook care about your privacy?

That’s how long our longest-tenured Facebook user at TeamRed has been using the popular social media platform. Facebook’s widespread adoption amongst both friends and family members also made some people truly grasp the importance of online privacy for the first time.

More