Congress Has a Chance to Finally End the NSA’s Mass Telephone Records Program

Congress Has a Chance to Finally End the NSA’s Mass Telephone Records Program

Coincidentally, EFF had organized a briefing of congressional staff the day after the Times report on the controversial surveillance law used to conduct telephone record surveillance: Section 215 of the Patriot Act. As we told Congress, it is long past time to end the telephone records program for good.

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Wipe: Reinstall OS and Overwrite All Free Space with Garbage Data You can use the “system restore” or “factory reset” feature on a lot of phones in order to roll back all of your apps, settings, and caches to the factory defaults.

Google will give Android users a choice of browser and search engine in Europe

Google will give Android users a choice of browser and search engine in Europe

Related Google is unbundling Android apps: all the news about the EU’s antitrust ruling “On Android phones, you’ve always been able to install any search engine or browser you want, irrespective of what came pre-installed on the phone when you bought it,” Walker says.

Now sites can fingerprint you online even when you use multiple browsers

Now sites can fingerprint you online even when you use multiple browsers

"From the negative perspective, people can use our cross-browser tracking to violate users' privacy by providing customized ads," Yinzhi Cao, the lead researcher who is an assistant professor in the Computer Science and Engineering Department at Lehigh University, told Ars.

How much privacy do you have left on the web?

The former requires providing your mobile phone number which is immediately tied to your real-life identity — more on that soon. So it seems that having your accounts linked to your real-life identity via your mobile phone number is usually unavoidable even if it’s not the same number you normally use.

Nevada considers technology to scan cellphones after crashes

Nevada considers technology to scan cellphones after crashes

(AP) — Most states ban texting behind the wheel, but a legislative proposal could make Nevada one of the first states to allow police to use a contentious technology to find out if a person was using a cellphone during a car crash.

Why Phone Numbers Stink As Identity Proof — Krebs on Security

Why Phone Numbers Stink As Identity Proof — Krebs on Security

Nixon said countless companies have essentially built their customer authentication around the phone number, and that a great many sites still let users reset their passwords with nothing more than a one-time code texted to a phone number on the account.

Google’s Nest fiasco harms user trust and invades their privacy

Google’s Nest fiasco harms user trust and invades their privacy

But, following a trust-shattering move by Google last month regarding its Nest Secure product, consensus on one issue has emerged: Companies shouldn’t ship products that can surreptitiously spy on users.

Apple makes cool new ad about iPhone Privacy

Apple makes cool new ad about iPhone Privacy

That’s iPhone.” Then we’re shown how we already value privacy in the everyday world in ways we might not relate to digital privacy: no trespassing signs and vicious guard dogs to protect our property, pausing a private conversation or swallowing a secret note from a classmate to avoid others receiving the message, and shredding personal information to leave no trace for identity thieves.

Ajit Pai’s plan for phone location data never mentions the word “privacy”

Ajit Pai’s plan for phone location data never mentions the word “privacy”

real-time geolocation information." Different data, different rules The FCC has previously said that any location data in the National Emergency Address Database (NEAD) "may not be used for any non-911 purpose, except as otherwise required by law." That's a stronger protection than what the FCC applies to other forms of Customer Proprietary Network Information (CPNI).

Free 'family tree' website shows your addresses, relatives and phone numbers

Free 'family tree' website shows your addresses, relatives and phone numbers

— Joining in on the current trend in genealogy and family tree websites, FamilyTreeNow lets you search anyone's name for free and get a list of known relatives, addresses, and phone numbers.

Who and what do you depend on in your everyday life?

Who and what do you depend on in your everyday life?

The interesting thing however, is the often cryptic ingredient list in the products I buy as well as the odd nutrition value. People come to the store to buy gasoline so they can get to places.

Facebook's Not Listening Through Your Phone. It Doesn't Have To

Facebook's Not Listening Through Your Phone. It Doesn't Have To

But unlike the Amazon Echo, which listens for just one of four trigger words, millions or perhaps billions of words and phrases could land you in a Facebook targeting segment. Because it has no specific trigger word for Facebook, your phone would need to listen for every targetable keyword.

As Phones Get Harder to Hack, Zero Day Vendors Hunt for Router Exploits

As Phones Get Harder to Hack, Zero Day Vendors Hunt for Router Exploits

Image: Seth Laupus/Motherboard On Thursday, Crowdfense, a company that buys zero day exploits from researchers and then sells them to government agencies, announced it is now offering a total of $15 million to hackers who have particular exploits for sale.

Shuttering of NSA surveillance program emboldens privacy groups

Shuttering of NSA surveillance program emboldens privacy groups

A top national security aide to House Minority Leader Kevin McCarthy Kevin Owen McCarthyShuttering of NSA surveillance program emboldens privacy groups The Hill's 12:30 Report: House Dems pass electoral reform bill after difficult week House passes sweeping electoral reform bill MORE (R-Calif.) recently revealed on a podcast that, for the past six months, the spy agency hasn't used a program that gathers metadata on domestic text messages and phone calls.

DIY enthusiasts make their own cell phone tower using a Raspberry Pi

DIY enthusiasts make their own cell phone tower using a Raspberry Pi

So yeah, this Raspberry Pi based project is a great demonstration of how expensive cellular infrastructure can be substituted to some extent using cheap, readily available hardware.

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

Image from Gamma Group’s sales brochures from the Security and Policing exhibition Britain’s biggest arms firm, BAE Systems, have also become the UK’s leading "lawful interception" company.

Facebook’s new move isn't about privacy. It’s about domination

Facebook’s new move isn't about privacy. It’s about domination

People in China use WeChat for everything from sending messages to family to reading news and opinion to ordering food to paying at vending machines to paying for a taxi.

Facebook Must Explain What it's Doing With Your Phone Number

Alarmingly, recent reports say that some of the phone numbers provided by users for the express purpose of two-factor authentication (2FA) as a way of securing their accounts are now made searchable across the platform by default.

Stalkers and Debt Collectors Impersonate Cops to Trick Big Telecom Into Giving Them Cell Phone Location Data

Stalkers and Debt Collectors Impersonate Cops to Trick Big Telecom Into Giving Them Cell Phone Location Data

The practice is ongoing according to the sources, and court documents and an audio recording obtained by Motherboard also detail a previously prosecuted case in which one debt collector tricked T-Mobile by fabricating cases of child kidnapping to convince the telco to hand over location data.

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

Your iPhone keeps a detailed list of every location you frequent — here's how to delete your history and shut the feature off for good

There's a little-known feature built into your iPhone that keeps a history of every location you've been — and how many times you've been there.

House aide: NSA has shut down phone call record surveillance

House aide: NSA has shut down phone call record surveillance

In a discussion recorded for the Lawfare Podcast released on March 2, Luke Murry said that the NSA was no longer collecting call detail records—the metadata associated with phone calls and text messages—and that the Trump administration had not used the program for over six months.

Wyden Calls for Permanent End to NSA Phone Records Program

I will not stop pushing Congress and intelligence leaders to be straight with the American people and end unnecessary surveillance that violates our constitutional freedoms without keeping us any safer.” Last year, Wyden and Sen. Rand Paul, R-Ky., asked the NSA Inspector General to investigate the NSA’s overcollection of phone records.

Facebook won't keep your two-factor phone number truly private

Facebook won't keep your two-factor phone number truly private

Twitter user Jeremy Burge pointed out, in a thread, that phone numbers could be searched, with "no way to disable" the feature. And it's impossible to disable the feature if you added your number -- only limit it to your immediate friend circle.

Hijacking WhatsApp without Hacking

Hijacking WhatsApp without Hacking

Not only can curious people like me read these, displaying the full content of messages on your lock screen can lead to your instant messaging accounts being hijacked. Of course, this will only work if the CEO’s phone displays incoming messages on the lock screen.

Facebook Doubles Down On Misusing Your Phone Number

Facebook Doubles Down On Misusing Your Phone Number

(Although Facebook stopped requiring phone numbers for 2FA enrollment last May , phone number-based 2FA can still be the most usable option for many people.) In response to a tweet from a Page administrator pointing out this critical problem, Facebook has been forced to respond to user concerns and media reports.

Uproar Over Facebook 2FA Privacy Violation

Uproar Over Facebook 2FA Privacy Violation

Connor Jones says it’s not for the first time we’ve heard complaints like these: [Facebook] encourages its users to set up 2FA account protection which requires a phone number.

Facebook secretly allows you to be looked up via your 2FA phone number and you can't opt out

Facebook secretly allows you to be looked up via your 2FA phone number and you can't opt out

Facebook has already admitted to using phone numbers collected under the guise of two-factor authentication in order to target ads, and now it turns out you can't opt-out of the service once you're committed.

Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication

Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication

Last week, Emojipedia founder Jeremy Burge warned in a viral Twitter thread that anyone could look him up on Facebook using his phone number, which he provided to the social network in order to enable two-factor authentication.

Schneier on Security

The Latest in Creepy Spyware The Nest home alarm system shipped with a secret microphone , which -- according to the company -- was only an accidental secret : On Tuesday, a Google spokesperson told Business Insider the company had made an "error." "The on-device microphone was never intended to be a secret and should have been listed in the tech specs," the spokesperson said.

More