Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

55 unique entities, owned by 46 parent companies, received or processed app user data, including developers and parent companies (first parties) and service providers (third parties). 37 (67%) provided services related to the collection and analysis of user data, including analytics or advertising, suggesting heightened privacy risks.

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Though the company said it properly informed users about the data-sharing, the government’s health ministry has since promised an investigation into the app.

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Brian Krebs of security news website cited an unnamed Facebook source as saying the internal investigation had so far indicated that as many as 600 million users of the social network had account passwords stored in plain text files searchable by more than 20,000 employees.

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI If you are new to LOKI, the Australian project is self described on their landing page as a “privacy network which will allow users to transact and communicate privately over the internet, providing a suite of tools to help maintain the maximum amount of anonymity possible while browsing, transacting and communicating online”.

P2P mesh routing

It would be impossible to implement one these protocols in order to create and maintain such a net as Netsukuku is, where every each node is a router by itself, because the map of all the routes would require a space, on each pc connected to the net, of about 10GB.

How To Disable WebRTC In Your Browser

How To Disable WebRTC In Your Browser

It might be best here to just use the definition provided on the WebRTC website : “WebRTC is an open framework for the web that enables Real Time Communications in the browser.

Web 3.0: The decentralised web promises to make the internet free again

Web 3.0: The decentralised web promises to make the internet free again

But it could also be a decentralised web that challenges the dominance of the tech giants by moving us away from relying so heavily on a few companies, technologies and a relatively small amount of internet infrastructure Peer-to-peer technology When we currently access the web, our computers use the HTTP protocol in the form of web addresses to find information stored at a fixed location, usually on a single server.

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

Citrix Internal Network Ravaged By Foreign Hackers, 6TB Of Data Stolen

Citrix Internal Network Ravaged By Foreign Hackers, 6TB Of Data Stolen

home IT/Enterprise by Paul Lilly — Saturday, March 09, 2019 Citrix Internal Network Ravaged By Foreign Hackers, 6TB Of Data Stolen Citrix Systems said it is cooperating with the Federal Bureau of Investigation (FBI) to investigate a major data breach by international cyber criminals into the company's internal network.

DIY enthusiasts make their own cell phone tower using a Raspberry Pi

DIY enthusiasts make their own cell phone tower using a Raspberry Pi

So yeah, this Raspberry Pi based project is a great demonstration of how expensive cellular infrastructure can be substituted to some extent using cheap, readily available hardware.

Want to Really Block the Tech Giants? Here's How

Want to Really Block the Tech Giants? Here's How

Advertisement For our purposes, what this meant was that when we were blocking the companies that do web hosting as a service—such as Amazon, Google, and Microsoft—websites they host would evade our firewall if they used a CDN from a third party because it didn’t look like the website was being sent from a tech giant.

Mark Zuckerberg discovers privacy

Mark Zuckerberg discovers privacy

Milking Facebook’s stewardship of WhatsApp for all it’s worth, Zuckerberg was intentional about pitching his new centralized yet private future for Facebook around the model of the encrypted messaging app, a platform so antithetical to Facebook’s broad mission that its founders left in disgust after cashing their checks.

A 'privacy-focused' Facebook would kill Zuckerberg's business model

A 'privacy-focused' Facebook would kill Zuckerberg's business model

Pinterest ‘The company plans to unify Instagram DMs, Facebook Messenger and WhatsApp, creating a single encrypted messaging service that links its three largest brands.’ Photograph: Chesnot/Getty Images Even if the change would help Facebook’s corporate goals, don’t hold your breath while you wait for it to ship.

Some major Android apps are still sending data directly to Facebook

Some major Android apps are still sending data directly to Facebook

Major Android mobile apps from companies including Yelp and Duolingo send data that could be used to personally identify you for ad tracking straight to Facebook immediately upon logging in, according to a new report from the London-based UK charity and watchdog group Privacy International (PI) .

Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication

Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication

Last week, Emojipedia founder Jeremy Burge warned in a viral Twitter thread that anyone could look him up on Facebook using his phone number, which he provided to the social network in order to enable two-factor authentication.

5G means you’ll have to say goodbye to your location privacy

5G means you’ll have to say goodbye to your location privacy

But since 5G towers will need to be everywhere and you’ll only connect to one 5G tower at a time, your mobile network will now be able to pinpoint your location much more accurately–even knowing which building you are in.

Washingtonpost.com: Microsoft to Rid Windows of Tracking Numbers

Enter symbols separated by a space: Look Up Symbols Portfolio Made Possible by: Microsoft to Rid Windows of Tracking Numbers By Ted Bridis Associated Press Monday, March 8, 1999; Page A08 Microsoft Corp., which sells the software runs most of the world's personal computers, said yesterday that its latest version of Windows generates a unique serial number that partly is planted within electronic documents and could be used to trace the identity of authors.

Ring Doorbell Flaw Opens Door to Spying

Ring Doorbell Flaw Opens Door to Spying

A serious flaw in the popular Ring smart doorbell could allow an attacker on a shared WiFi network to spy on families’ video and audio footage, according to researchers.

Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked

Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked

The database record on Haqqani, who was categorized under “sanctions list” and terror,” included (and condensed for clarity): DOW JONES NOTES: Killed in Pakistan's North Waziristan tribal area on 21-Aug-2012.

The best secure browsers 2019

The best secure browsers 2019

In this article I will share my personal recommendations for most secure browsers to use and extensions that would add an extra layer of protection.

How To Encrypt Your Internet Traffic

How To Encrypt Your Internet Traffic

You can protect your privacy on a micro-level by focusing on keeping websites from collecting your private information, but on a broader scale, you can encrypt all of your internet activity with one sweep by encrypting your router.

Cloudflare expands its government warrant canaries

Cloudflare expands its government warrant canaries

The networking and content delivery network giant said in a blog post this week that it’s expanding the transparency reports to include more canaries. Cloudflare’s expanded canaries were included in the company’s latest transparency report, out this week.

New flaws in 4G, 5G allow attackers to intercept calls and track phone locations

New flaws in 4G, 5G allow attackers to intercept calls and track phone locations

“Any person with a little knowledge of cellular paging protocols can carry out this attack… such as phone call interception, location tracking, or targeted phishing attacks.” Syed Rafiul Hussain, Purdue University The paper, seen by TechCrunch prior to the talk, details the attacks: the first is Torpedo, which exploits a weakness in the paging protocol that carriers use to notify a phone before a call or text message comes through.

Once hailed as unhackable, blockchains are now getting hacked

Once hailed as unhackable, blockchains are now getting hacked

A blockchain protocol is a set of rules that dictate how the computers in the network, called nodes , should verify new transactions and add them to the database.

Want to evade censorship and protect your privacy? A rough and dirty guide to the DOH system

Want to evade censorship and protect your privacy? A rough and dirty guide to the DOH system

DoH allows your browser to make encrypted DNS queries to resolve domain names, so for instance if you wanted to visit www.streamable.com, your ISP would no longer know what requests your browser made to your DNS service provider.

South Korea expands internet censorship to HTTPS with first countrywide use of SNI filtering

South Korea expands internet censorship to HTTPS with first countrywide use of SNI filtering

This basic DNS filtering was defeatable by using a different DNS server or visiting the HTTPS versions of websites. Furthermore, according to Cloudflare’s Nick Sullivan, South Korea seems to be blocking encrypted SNI automatically.

Gain your Privacy back using OnionShare

Gain your Privacy back using OnionShare

OnionShare starts a web server allowing it to get connected and access Tor Onion Service in a stealthy manner over the internet.

Google backtracks on Chrome modifications that would have crippled ad blockers

Google backtracks on Chrome modifications that would have crippled ad blockers

Featured stories The study , carried out by the team behind the Ghostery ad blocker, found that ad blockers had sub-millisecond impact on Chrome's network requests that could hardly be called a performance hit.

'Google, this is bogus as hell' — one of the fathers of the internet blasts Google for how Chromecast behaves on his home network

'Google, this is bogus as hell' — one of the fathers of the internet blasts Google for how Chromecast behaves on his home network

Read: AT&T signed an ‘8-digit’ deal that isn’t good news for VMware, Cisco, or Huawei – but could be great for Google Cloud DNS turns the words you type into your browser, like businessinsider.com, in the numerical internet address that computers use to find webpages, videos or whatnot and deliver them to your device.

Facebook's security team tracks posts, location for 'BOLO' threat list

Facebook's security team tracks posts, location for 'BOLO' threat list

Any suggestion our onsite physical security team has overstepped is absolutely false." Facebook is unique in the way it uses its own product to mine data for threats and locations of potentially dangerous individuals, said Tim Bradley, senior consultant with Incident Management Group, a corporate security consulting firm that deals with employee safety issues.

More