Apple tells app developers to disclose or remove screen recording code

Apple tells app developers to disclose or remove screen recording code

Apple is telling app developers to remove or properly disclose their use of analytics code that allows them to record how a user interacts with their iPhone apps — or face removal from the app store, TechCrunch can confirm.

Saudi Arabia: An app to track women

Saudi Arabia: An app to track women

A surveillance system has been set up by the Saudi government to control women and prevent them from fleeing the country, known as the ‘Absher’ application, it allows guardians of women (brothers, husbands, and fathers) to track down their movements.

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

A team of former U.S. government intelligence operatives working for the United Arab Emirates hacked into the iPhones of activists, diplomats and rival foreign leaders with the help of a sophisticated spying tool called Karma […] The […] operatives described Karma as a tool that could remotely grant access to iPhones simply by uploading phone numbers or email accounts into an automated targeting system.

Apple blocks Facebook from running its internal iOS apps

Apple blocks Facebook from running its internal iOS apps

Apple has shut down Facebook’s ability to distribute internal iOS apps, from early releases of the Facebook app to basic tools like a lunch menu.

Apple Was Slow to Act on FaceTime Bug That Allows Spying on iPhones

Apple Was Slow to Act on FaceTime Bug That Allows Spying on iPhones

On Friday, Apple’s product security team encouraged Ms. Thompson, a lawyer, to set up a developer account to send a formal bug report. The company reacted after a separate developer reported the FaceTime flaw and it was written about on the Apple fan site 9to5mac.com , in an article that went viral.

Quality of Open Source Software: how many eyes are enough?

Quality of Open Source Software: how many eyes are enough?

A possible explanation might be expressed in what’s known as Linus’s Law : “many eyes make any bug shallow.” This ‘mantra’ of the Open Source community suggests that users should not worry about the quality of OSS if enough people look at the code.

Privacy Analyst Job in Montreal, QC

The successful candidate will support the Data Privacy group on a wide range of assigned and special projects, such as the execution of routine privacy audits, data-infrastructure risk management, security controls, policies and research reports.

Project Alias Prevents Alexa And Google From Eavesdropping On You

Project Alias Prevents Alexa And Google From Eavesdropping On You

There have always been concerns about smart speakers such as Amazon Echo and Google Home, listening to your private conversations at home or offices, all the time.

EOSBet Gets Ready for Mainstream Adoption with Account System Launch

EOSBet Gets Ready for Mainstream Adoption with Account System Launch

This account system enables users to deposit funds from any source, and easily bet without the use of a wallet or Scatter. For the first time ever, non-EOS account holders can receive BET and participate in our player rewards program, opening the door to entire new markets.

2019: The Year of Enigma

2019: The Year of Enigma

If you’re organizing a conference or event this year and would like a member of the Enigma team to speak or present on privacy, secret contracts, or decentralization, we’re interested!

Tech skills in most demand this year: data, cloud and cybersecurity

Tech skills in most demand this year: data, cloud and cybersecurity

Almost every job in tech now requires security awareness and basic know-how." The Hays report, based on 2,000 companies, finds that 70 percent of IT employers say they face a moderate-to-extreme skills shortage of IT professionals.

Package tracking app turns users’ devices into a bot farm, violates user privacy

Package tracking app turns users’ devices into a bot farm, violates user privacy

The app will then perform the tracking by sending a request to the courier’s API or website as specified by the instruction it received from the server, sending the results to the app’s server so it can display them to the user who’s actually registered that package for tracking.

[Thread] dnscrypt-proxy on iOS · Issue #42 · jedisct1/dnscrypt-proxy

[Thread] dnscrypt-proxy on iOS · Issue #42 · jedisct1/dnscrypt-proxy

I’m a dev and I want to spend my time on development, not on fighting with copycats. The mentioned Mike’s OB and many other devs that were making opensource projects for iOS stucked with exactly the same problem.

Popular Android apps sending user data to Facebook without user consent, likely illegally

Popular Android apps sending user data to Facebook without user consent, likely illegally

The Privacy International campaign group found that at least 20 [apps] send certain data to Facebook in the second that they open in a phone, before [users] can be asked for permission.

11 key readings on children’s data and privacy online

11 key readings on children’s data and privacy online

Here we highlight 11 studies that we have found valuable for insights regarding how children conceptualise privacy, their (often frustrated and resigned) interactions with digital environments as they negotiate privacy, their understandings of data, and the role of parents in children’s privacy online.

Librem 5 dev kits are shipping!

Librem 5 dev kits are shipping!

This channel will be staffed by our engineering team who will be on hand to answer questions, work with the community on merge requests, and be available for those who are using the dev kits.

Google isn’t the company that we should have handed the Web over to

Google isn’t the company that we should have handed the Web over to

By owning both the most popular browser, Chrome, and some of the most-visited sites on the Web (in particular the namesake search engine, YouTube, and Gmail), Google has on a number of occasions used its might to deploy proprietary tech and put the rest of the industry in the position of having to catch up.

Signal app to Australia: Good luck with that crypto ban

Signal app to Australia: Good luck with that crypto ban

Signal, one of the most secure messaging apps, essentially told Australia this week that its attempts to thwart strong crypto are rather cute Lund is referring to a recent law passed in Australia that will fine companies that do not comply with government demands for encrypted data up to AUS$10 million.

Facebook admits bug allowed apps to see hidden photos

Facebook admits bug allowed apps to see hidden photos

For two weeks in September, an error in the way Facebook shares photos with third parties meant that apps could see not only photos users had posted on their newsfeed, but also pictures in other parts of the site – on Facebook Stories or Facebook’s Marketplace, for instance.

Signal >> Blog >> Setback in the outback

Signal >> Blog >> Setback in the outback

We can’t include a backdoor in Signal, but that isn’t a new dynamic either. Although we can’t include a backdoor in Signal, the Australian government could attempt to block the service or restrict access to the app itself.

The EU’s Next Budget Threatens Privacy Around the World for Decades to Come

The EU’s Next Budget Threatens Privacy Around the World for Decades to Come

Emergency Trust Fund for Africa in 2015 aiming to stop ‘irregular’ migration by, amongst other things, ‘enforcing the rule of law through capacity building in support of security and development as well as law enforcement, including border management and migration related aspects’ and contributing to ‘preventing and countering radicalisation and extremism.

Development and Humanitarian Sector

Development and Humanitarian Sector

There is no question that advancements in technology, communications and data-intensive systems have significantly changed the way development programmes are delivered and humanitarian assistance can be provided to ensure more people can benefit, more rapidly and more effectively.

Exposing Aiding Surveillance: Raising the cause of the world’s most vulnerable people’s

Under pressure to be more accountable for their use of resources, but also due to the post-9/11 push to track and identify terrorists across the world, the humanitarian and development sectors began increasingly to look to identity registration, including biometrics, and the collection and sharing of vast amounts of data on their beneficiaries.

Half of the Tor Project's funding now comes from the private sector

Half of the Tor Project's funding now comes from the private sector

"In terms of percentages, while 2015 saw 85% of our funding coming from US government sources, 2016 saw the fraction drop to 76%, and in 2017 we're down to 51%," said Roger Dingledine, co-founder of the Tor Project and original developer of the Tor anonymity software.

Project Ara

Project Ara

Google stated that Project Ara was being designed to be utilized by "6 billion people": 1 billion current smartphone users, and 5 billion feature phone users.[9][10] Google intended to sell a starter kit where the bill of materials is US$50 and includes a frame, display, battery, low-end CPU and WiFi.[3]

Facebook’s internal documents show its ruthlessness

Facebook’s internal documents show its ruthlessness

In November 2012, in an email about reciprocity and data value, Zuckerberg talked about how Facebook's goal was to let people "share everything they want." Developers on the site, he said, could build apps to let users do exactly that, but Facebook needed to be wary of them becoming a competitor in the social media space.

Facebook discussed cashing in on user data, emails suggest

Facebook discussed cashing in on user data, emails suggest

staff in 2012 discussed removing restrictions on user data for companies who were able to spend upwards of $250,000 on mobile advertising, before ultimately deciding to apply a uniform policy restricting such access two years later, according to a tranche of internal emails released by the UK parliament.

Report: Microsoft is scrapping Edge, switching to just another Chrome clone

Report: Microsoft is scrapping Edge, switching to just another Chrome clone

There's nothing magical about Blink or V8 that makes the Chrome password manager better than Edge's; it's just that Google has taken the time to do the work.

The Little-Known Ways Ethereum Reveals User Location Data

Taking the example of light clients – the stripped down, low-storage way for ethereum users to access the network – Szilagyi said that there are two kinds of activity on the network that are highly traceable.

Between The Jetsons and Black Mirror: Google Reveals New Plan For Smart City

Between The Jetsons and Black Mirror: Google Reveals New Plan For Smart City

“Torontonians want more affordable housing, faster ways to get around the city, safer streets for pedestrians and cyclists, [and] a cleaner and healthier environment,” says a statement from Jesse Shapins, Sidewalk Labs’s director of public realm.

More