Fighting The Citadels That Own Our Data: How Web3 Empowers Us To Take Back Control

Fighting The Citadels That Own Our Data: How Web3 Empowers Us To Take Back Control

In the face of myriad privacy breaches as a result of the ownership of our data by big corporations, Web 3.0 – otherwise known as a decentralised internet based on true peer-to-peer interaction – represents a beacon of hope to enable individuals to take back control from the current generation of internet behemoths.

BEST APP TO HELP YOU TRACK EMBEDDED IN YOUR PHONES?

BEST APP TO HELP YOU TRACK EMBEDDED IN YOUR PHONES?

For Android clients, the application Exodus Privacy can enable you to distinguish what trackers are on your telephone, and what publicizing systems they are giving data. For Android clients, the application Exodus Privacy can enable you to distinguish what trackers are on your telephone, and what publicizing systems they are giving data.

Austria mulls user registration for online platforms

Austria mulls user registration for online platforms

Austria said Wednesday it was considering a law to make it mandatory for big internet platforms to register their users and deprive those behind hate posts of anonymity.

Your Smartphone Apps Are Filled With Trackers You Know Nothing About

Your Smartphone Apps Are Filled With Trackers You Know Nothing About

Both of these SDKs allow Facebook and Google to track users beyond their desktop web browsers and automatically collect information like when you installed the app, each time you opened it, and what you purchased.

How to increase your chances of finding a hidden camera

How to increase your chances of finding a hidden camera

Step 3: Scan the house network to identify potential cameras. That is, if a host wants to hide a camera they can connect it to a network that you may not have access to.

Opinion | Why It’s So Easy for a Bounty Hunter to Find You

Opinion | Why It’s So Easy for a Bounty Hunter to Find You

Your carrier needs this data to deliver service. But, according to recent news reports, this real-time phone location data has long been available to entities beyond your wireless carrier, for a price.

Your Location Is Gold to Businesses

Your Location Is Gold to Businesses

Google Maps — Multiple-Billion-Dollar Business Based on a Free Map. Location-targeted mobile advertisement spending is quickly growing. Based on its users’ 12 billion check-in data points every month, Foursquare accurately predicted the amount of new iPhone sales and has attracted 125,000 developers to work on its platform.

My 1-week Code and Legal Part Review on “Crypviser” Messenger.

My 1-week Code and Legal Part Review on “Crypviser” Messenger.

Crypviser positions itself as a protected, decentralized and anonymous messenger with identification via blockchain. Crypviser and its applications are under the complete control of this company:The source code is not public, so the question of security of messaging is closed.

Data Breaches

Data Breaches

Stationary Device (STAT) Stationary computer loss (lost, inappropriately accessed, discarded or stolen computer or server not designed for mobility) Unintended Disclosure (DISC) Unintended disclosure (not involving hacking, intentional breach or physical loss – for example: sensitive information posted publicly, mishandled or sent to the wrong party via publishing online, sending in an email, sending in a mailing or sending via fax) Unknown

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

A million tiny eyes in the sky: how a new generation of nanosatellites pose a threat to privacy

A million tiny eyes in the sky: how a new generation of nanosatellites pose a threat to privacy

Another company in this sector, Orbital Insight , explains its services in the following way: “By applying machine learning and computer vision technologies, we build software that interprets data at petabyte scale to drive better business and policy decisions.” Similarly, SpaceKnow says: Our AI driven platform unlocks the power and potential of geospatial analysis.

Serious Chrome zero-day – Google says update “right this minute”

Serious Chrome zero-day – Google says update “right this minute”

DEEP LEARNING FOR DEEPER CYBERSECURITY Watch Video The reason that even the Chrome team are wading in with you’d-better-update warnings is the recent appearance of a zero-day security vulnerability, dubbed CVE-2019-5786, for which Google says it is “aware of of reports that an exploit […] exists in the wild.” To clarify.

A Privacy-Focused Facebook? We'll Believe It When We See It.

A Privacy-Focused Facebook? We'll Believe It When We See It.

The Proof is in the Pudding At the core of Zuckerberg’s announcement is Facebook’s plan to merge its three messaging platforms: Facebook’s Messenger, Instagram’s Direct, and WhatsApp. The announcement promises security and privacy features across the board, including end-to-end encryption, ephemerality, reduced data retention, and a commitment to not store data in countries with poor human rights records.

Report – Dalil Data Breach: 5+ Million Users’ Data Exposed by Unsecured App

Report – Dalil Data Breach: 5+ Million Users’ Data Exposed by Unsecured App

While the database does protect some data (for example, user passwords are hashed), the available information allows us to create fairly accurate user profiles.

How to Secure Your Identity & Become Anonymous Online in 2019

How to Secure Your Identity & Become Anonymous Online in 2019

Readers who want to transition from Gmail entirely can start by going through primary online accounts and updating them to use their new ProtonMail email address.

Verifying Software Signatures

Verifying Software Signatures

[3] In this instance, "other authentication systems" refers to: [4] Checking Digital Fingerprints of Signed Software [ edit ] Once a user has carefully: Then the file(s) signatures must be verified against the signing key.

New Study Highlights IoT Security and Privacy Flaws in Popular Off the Shelf Devices

New Study Highlights IoT Security and Privacy Flaws in Popular Off the Shelf Devices

The report from Pepper IoT and Dark Cubed detailed a wide variety of security issues and privacy flaws in common Internet of Things (IoT) devices, including some cases where devices such as smart light bulbs were communicating personal data and information to third-party companies in China.

Shoshana Zuboff Q&A: The Age of Surveillance Capital

Shoshana Zuboff Q&A: The Age of Surveillance Capital

Zuboff, who published her first book in 1989 on the future of technology and data in the workplace, warns in Surveillance Capitalism of a “seventh extinction” that threatens to eradicate “what has been held most precious in human nature.” Given the fragility of the global political and economic order, surveillance capitalism amounts to a “coup from above,” Zuboff argues, an assault on democracy by way of subverting the very idea of what it means to be an individual.

How Does Facebook Work?

How Does Facebook Work?

For example, if you use Facebook to connect to popular book review site Goodreads, Facebook will then know which books you read and reviewed, and can then serve you ads for books by the same author or in the same genre.

Differential privacy, an easy case

Differential privacy, an easy case

However, as long as we know the precise fraction of the spinner that is light, we can use the randomized responses to estimate something about our group of respondents, like the fraction of people who actually answered “Yes” to the original question.

Pragmatic Cypherpunk’s Personal Backup

Pragmatic Cypherpunk’s Personal Backup

Borg is super flexible but it does not cover “the last mile” some users would expect — things like periodic running, default opinionated setup, and desktop notifications integration. It also offers opinionated borg configuration for pragmatic remote backups with focus on security and efficiency.

What business leaders can learn from Jeff Bezos’ leaked texts

What business leaders can learn from Jeff Bezos’ leaked texts

In January, France’s National Data Protection Commission sent a message by fining Google $57 million for breaching GDPR rules. Let’s hope this news cycle convinces our corporate leaders and elected officials to embrace data privacy, protection and minimization because it responsible, profitable and efficient.

Facial Recognition Surveillance Now at a Privacy Tipping Point

Facial Recognition Surveillance Now at a Privacy Tipping Point

Facebook, for example, now uses AI-powered facial recognition software as part of its core social networking platform to identify people, while law enforcement agencies around the world have experimented with facial recognition surveillance cameras to reduce crime and improve public safety.

Privacy fears as Google and Amazon can use smart home data to learn your daily habits

Privacy fears as Google and Amazon can use smart home data to learn your daily habits

Concerns have grown around how much data these applications are collecting and how it's being used In the past, if users asked Alexa to turn on their smart bulb, Alexa would transmit code to the device to check if it was on or off, receive confirmation that it was off and then tell it to turn on, Bloomberg noted.

Security/Anti tracking policy

Security/Anti tracking policy

Examples include, but are not limited to: While this type of tracking is not currently blocked in Firefox, we may apply additional restrictions to the third parties engaged in this type of tracking in the future.

Signal >> Blog >> I link therefore I am

Signal >> Blog >> I link therefore I am

Previewing the future As time goes on, we may expand the list of sites where link previews are available with new additions that include the necessary meta tags and support HTTPS connections that are compatible with Signal’s privacy-enhancing proxy.

Top security and privacy TED Talks from 2018

Top security and privacy TED Talks from 2018

For example, he was able to figure out what time the family wakes up in the morning because the Amazon Echo would start playing songs from Spotify between 6 a.m. and 8 a.m. How tech companies deceive you into giving up your data and privacy “How tech companies deceive you into giving up your data and privacy” is a somewhat related 2018 TED Talk that falls under the heading of TED Salon.

Will talking to AI voice assistants re-engineer our human conversations?

Will talking to AI voice assistants re-engineer our human conversations?

We don’t need to put the same effort into making the conversation polite or interesting when we’re talking to a chatbot. It is possible that talking to machines all the time could re-engineer the way we have conversations.

Chinese face-recognition technology spots wanted man at 60,000-people concert

Chinese face-recognition technology spots wanted man at 60,000-people concert

The most funny and cyberpunk dystopia part was, during a test run, if the jaywalkers don't want to pay a fine, traffic police has given them another opinion: posting an warning of your misbehave on your social media account!The mass-deployment may be coming soon.And it is rumored that the subways would soon require a proof of identity.

FBI Wish List: An App That Can Recognize the Meaning of Your Tattoos

FBI Wish List: An App That Can Recognize the Meaning of Your Tattoos

The agencies had provided a dataset of thousands of prisoner tattoos to some 19 outside groups, including companies and academic institutions, that are developing image recognition and biometric technology.

More