Saudi Arabia: An app to track women

Saudi Arabia: An app to track women

A surveillance system has been set up by the Saudi government to control women and prevent them from fleeing the country, known as the ‘Absher’ application, it allows guardians of women (brothers, husbands, and fathers) to track down their movements.

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

Powerful iPhone spy tool allowed UAE to view photos, emails, texts, locations and passwords

A team of former U.S. government intelligence operatives working for the United Arab Emirates hacked into the iPhones of activists, diplomats and rival foreign leaders with the help of a sophisticated spying tool called Karma […] The […] operatives described Karma as a tool that could remotely grant access to iPhones simply by uploading phone numbers or email accounts into an automated targeting system.

Quality of Open Source Software: how many eyes are enough?

Quality of Open Source Software: how many eyes are enough?

A possible explanation might be expressed in what’s known as Linus’s Law : “many eyes make any bug shallow.” This ‘mantra’ of the Open Source community suggests that users should not worry about the quality of OSS if enough people look at the code.

Privacy Analyst Job in Montreal, QC

The successful candidate will support the Data Privacy group on a wide range of assigned and special projects, such as the execution of routine privacy audits, data-infrastructure risk management, security controls, policies and research reports.

Project Alias Prevents Alexa And Google From Eavesdropping On You

Project Alias Prevents Alexa And Google From Eavesdropping On You

There have always been concerns about smart speakers such as Amazon Echo and Google Home, listening to your private conversations at home or offices, all the time.

EOSBet Gets Ready for Mainstream Adoption with Account System Launch

EOSBet Gets Ready for Mainstream Adoption with Account System Launch

This account system enables users to deposit funds from any source, and easily bet without the use of a wallet or Scatter. For the first time ever, non-EOS account holders can receive BET and participate in our player rewards program, opening the door to entire new markets.

2019: The Year of Enigma

2019: The Year of Enigma

If you’re organizing a conference or event this year and would like a member of the Enigma team to speak or present on privacy, secret contracts, or decentralization, we’re interested!

Tech skills in most demand this year: data, cloud and cybersecurity

Tech skills in most demand this year: data, cloud and cybersecurity

Almost every job in tech now requires security awareness and basic know-how." The Hays report, based on 2,000 companies, finds that 70 percent of IT employers say they face a moderate-to-extreme skills shortage of IT professionals.

[Thread] dnscrypt-proxy on iOS · Issue #42 · jedisct1/dnscrypt-proxy

[Thread] dnscrypt-proxy on iOS · Issue #42 · jedisct1/dnscrypt-proxy

I’m a dev and I want to spend my time on development, not on fighting with copycats. The mentioned Mike’s OB and many other devs that were making opensource projects for iOS stucked with exactly the same problem.

Popular Android apps sending user data to Facebook without user consent, likely illegally

Popular Android apps sending user data to Facebook without user consent, likely illegally

The Privacy International campaign group found that at least 20 [apps] send certain data to Facebook in the second that they open in a phone, before [users] can be asked for permission.

11 key readings on children’s data and privacy online

11 key readings on children’s data and privacy online

Here we highlight 11 studies that we have found valuable for insights regarding how children conceptualise privacy, their (often frustrated and resigned) interactions with digital environments as they negotiate privacy, their understandings of data, and the role of parents in children’s privacy online.

Librem 5 dev kits are shipping!

Librem 5 dev kits are shipping!

This channel will be staffed by our engineering team who will be on hand to answer questions, work with the community on merge requests, and be available for those who are using the dev kits.

Google isn’t the company that we should have handed the Web over to

Google isn’t the company that we should have handed the Web over to

By owning both the most popular browser, Chrome, and some of the most-visited sites on the Web (in particular the namesake search engine, YouTube, and Gmail), Google has on a number of occasions used its might to deploy proprietary tech and put the rest of the industry in the position of having to catch up.

Signal >> Blog >> Setback in the outback

Signal >> Blog >> Setback in the outback

We can’t include a backdoor in Signal, but that isn’t a new dynamic either. Although we can’t include a backdoor in Signal, the Australian government could attempt to block the service or restrict access to the app itself.

The EU’s Next Budget Threatens Privacy Around the World for Decades to Come

The EU’s Next Budget Threatens Privacy Around the World for Decades to Come

Emergency Trust Fund for Africa in 2015 aiming to stop ‘irregular’ migration by, amongst other things, ‘enforcing the rule of law through capacity building in support of security and development as well as law enforcement, including border management and migration related aspects’ and contributing to ‘preventing and countering radicalisation and extremism.

Development and Humanitarian Sector

Development and Humanitarian Sector

There is no question that advancements in technology, communications and data-intensive systems have significantly changed the way development programmes are delivered and humanitarian assistance can be provided to ensure more people can benefit, more rapidly and more effectively.

Exposing Aiding Surveillance: Raising the cause of the world’s most vulnerable people’s

Under pressure to be more accountable for their use of resources, but also due to the post-9/11 push to track and identify terrorists across the world, the humanitarian and development sectors began increasingly to look to identity registration, including biometrics, and the collection and sharing of vast amounts of data on their beneficiaries.

Half of the Tor Project's funding now comes from the private sector

Half of the Tor Project's funding now comes from the private sector

"In terms of percentages, while 2015 saw 85% of our funding coming from US government sources, 2016 saw the fraction drop to 76%, and in 2017 we're down to 51%," said Roger Dingledine, co-founder of the Tor Project and original developer of the Tor anonymity software.

Project Ara

Project Ara

Google stated that Project Ara was being designed to be utilized by "6 billion people": 1 billion current smartphone users, and 5 billion feature phone users.[9][10] Google intended to sell a starter kit where the bill of materials is US$50 and includes a frame, display, battery, low-end CPU and WiFi.[3]

Report: Microsoft is scrapping Edge, switching to just another Chrome clone

Report: Microsoft is scrapping Edge, switching to just another Chrome clone

There's nothing magical about Blink or V8 that makes the Chrome password manager better than Edge's; it's just that Google has taken the time to do the work.

Between The Jetsons and Black Mirror: Google Reveals New Plan For Smart City

Between The Jetsons and Black Mirror: Google Reveals New Plan For Smart City

“Torontonians want more affordable housing, faster ways to get around the city, safer streets for pedestrians and cyclists, [and] a cleaner and healthier environment,” says a statement from Jesse Shapins, Sidewalk Labs’s director of public realm.

In China, your car may be spying on you for the government

In China, your car may be spying on you for the government

SHANGHAI — Global automakers are feeding real-time location information and dozens of other data points from electric vehicles to Chinese government monitoring centers, potentially adding to China’s rich kit of surveillance tools as President Xi Jinping steps up the use of technology to track Chinese citizens.

Iridium Browser

Iridium Browser

It takes the Chromium code base, which is also used for the official Chrome browser, and enhances its security and sets certain policies by default. The Iridium Browser project is backed by the Open Source Business Alliance.

Google, Mozilla working on letting web apps edit files despite warning it could be 'abused in terrible ways'

Google, Mozilla working on letting web apps edit files despite warning it could be 'abused in terrible ways'

A group led by Google and Mozilla is working to make it easy to edit files using browser-based web apps but wants advice on how to guard against the "major" security and privacy risks.

EPIC's Rotenberg Urges Support for AI Guidelines at OECD

EPIC's Rotenberg Urges Support for AI Guidelines at OECD

Speaking to the OECD Global Strategy Group in Paris, EPIC President Marc Rotenberg urged OECD member countries to endorse the Universal Guidelines for AI. The OECD Global Strategy Group brings together senior officials from member countries to discuss the challenges shaping today's world.

China's Surveillance State Should Scare Everyone

China's Surveillance State Should Scare Everyone

The new social credit system under development will consolidate reams of records from private companies and government bureaucracies into a single “citizen score” for each Chinese citizen.

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

Google’s “Smart City of Surveillance” Faces New Resistance in Toronto

The group represents the latest and largest effort by Torontonians to start having the kinds of public conversations, teach-ins, and debates that should have “taken place last year, when this project was first announced,” according to Bianca Wylie, co-founder of Tech Reset Canada and one of the lead organizers of the opposition to Sidewalk Toronto.

Companies Using Push Notifications for Mobile App Uninstall Tracking

Companies Using Push Notifications for Mobile App Uninstall Tracking

Using uninstall tracking based on push notifications well-known companies that provide mobile apps are still able to reach out to consumers in efforts to lure them back – and potentially aim targeted advertising efforts at them – even though they have deleted the application.

Librem 5 Development Kits: we are getting there! – Purism

Librem 5 Development Kits: we are getting there! – Purism

So once the PCBs finally arrived, on the same day we set up all the machines and worked until 5 a.m. to make the first 10 “golden sample” prototypes of the development base boards:

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming

The information I found on the drives, including candidates, precincts, and the number of votes cast on the machine, were not encrypted. By using a $15 palm-sized device, my team was able to exploit a smart chip card, allowing us to vote multiple times.

More