The privacy risks of pre-installed software on Android devices

The privacy risks of pre-installed software on Android devices

Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them. On the one hand, the permission model on the Android operating system and its apps allow a large number of actors to track and obtain personal user information.

Big Tech is Spying on Us: a collection of articles to freak you out and convince your doubting friends.

Big Tech is Spying on Us: a collection of articles to freak you out and convince your doubting friends.

It's in Big Tech's DNA to spy on us, and the proliferation of IoT / smart home gadgets along with artificial intelligence (AI) algorithms are only going accelerate the problem.

Google Quietly Adds Search Engine Privacy Option To Chrome - Here's How To Enable It

Google Quietly Adds Search Engine Privacy Option To Chrome - Here's How To Enable It

The latest Google Chrome web browser update has a pleasant surprise in store for users who value their privacy. Indeed, DuckDuckGo enters into an agreement with the user to block advertising trackers, keep your search history private and allow you to take control of your personal data by not storing it.

Utah Just Became a Leader in Digital Privacy

Utah Just Became a Leader in Digital Privacy

Rather than wait for court action, Utah legislators passed this latest privacy law, which requires law enforcement to obtain a warrant with probable cause in order to access any electronic data held by a third party, at least in most cases.

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

55 unique entities, owned by 46 parent companies, received or processed app user data, including developers and parent companies (first parties) and service providers (third parties). 37 (67%) provided services related to the collection and analysis of user data, including analytics or advertising, suggesting heightened privacy risks.

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Though the company said it properly informed users about the data-sharing, the government’s health ministry has since promised an investigation into the app.

I’m 14, and I quit social media after discovering what was posted about me

Teens get a lot of warnings that we aren’t mature enough to understand that everything we post online is permanent, but parents should also reflect about their use of social media and how it could potentially impact their children’s lives as we become young adults.

Facial recognition can speed you through airport security, but there's a cost

Facial recognition can speed you through airport security, but there's a cost

"US Customs and Border Protection is changing the face of travel with its cloud-based facial biometric matching service," the agency says in a pamphlet explaining the technology.

Who Defends Your Data? Report Reveals Peruvian ISPs Progress on User Privacy, Still Room for Improvement

Who Defends Your Data? Report Reveals Peruvian ISPs Progress on User Privacy, Still Room for Improvement

Judicial Order: Companies earned a star in this category if they require that the government obtain a warrant from a judge before handing over user data (either content or metadata).

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Facebook admits storing unencrypted user passwords on its server, says issue fixed

Brian Krebs of security news website cited an unnamed Facebook source as saying the internal investigation had so far indicated that as many as 600 million users of the social network had account passwords stored in plain text files searchable by more than 20,000 employees.

Criminal Suspects Deserve Genetic Privacy, Too

Criminal Suspects Deserve Genetic Privacy, Too

Both sites allow individuals to obtain raw DNA data files, which they can then upload to an open-source database like GEDmatch in order to connect them to distant family members.

Most Companies Aren't Ready for California's Tough New Privacy Law

Most Companies Aren't Ready for California's Tough New Privacy Law

About half of the professionals surveyed currently fall under the European Union’s General Data Protection Regulation, a set of new privacy laws that went into effect in May. Of those professionals, half of them say their GDPR programs are helping them plan for California’s new rules.

Law enforcement needs to protect citizens and their data

Law enforcement needs to protect citizens and their data

While the bill includes limited restrictions on law enforcement requests, the vague definitions and concentrated authorities give the Australian government sweeping powers that ultimately undermine the security and privacy of the very citizens they aim to protect.

The Government wants to free up your bank data. Here's what that means for you

The Government wants to free up your bank data. Here's what that means for you

The Consumer Data Right (CDR), which begins to come online mid-year, aims to give Australians more agency to access and control parts of their personal information.

With facial recognition, shoplifting may get you banned in places you've never been

With facial recognition, shoplifting may get you banned in places you've never been

If a logged person tries entering the store, Kogniz's facial recognition will be able to detect that and flag security, Daniel Putterman, the company's co-founder and director, said in an interview. There aren't any rules or standards governing how companies use facial recognition technology.

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Preparing for Travel – Properly Backing Up Your Android Cell Phone

Wipe: Reinstall OS and Overwrite All Free Space with Garbage Data You can use the “system restore” or “factory reset” feature on a lot of phones in order to roll back all of your apps, settings, and caches to the factory defaults.

Facial recognition has no checks, and that’s bad news for our privacy

Facial recognition has no checks, and that’s bad news for our privacy

If a logged person tries entering the store, Kogniz's facial recognition will be able to detect that and flag security, Daniel Putterman, the company's co-founder and director, said in an interview. One store that uses Kogniz shares its login information with its local police department, Putterman said.

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Two years ago, Google has silently handed the project E2EMail which was started to enable easy end-to-end encryption in Gmail via a browser extension to "the open source community". Three years earlier, Google had announced that they are building an end-to-end encrypted Chrome plugin to automatically encrypt emails between Gmail users.

Login With Facebook, Google or AT&T? Thanks, but No Thanks

Login With Facebook, Google or AT&T? Thanks, but No Thanks

There's more: Project Verify is better than the Facebook and Google SSOs because it's going to be checked against your mobile SIM card, phone number, user credentials, account tenure and phone account type (info only your wireless carrier has).

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Why You Should Be Worried about Online Ad Tracking (Step-By-Step Guide to Stop It)

Open Settings Go to Privacy Select Advertising Toggle the Limit Ad Tracking switch Even if you turn this feature off, Apple can still collect data about you to send ads in the right language and for the right location.

Now sites can fingerprint you online even when you use multiple browsers

Now sites can fingerprint you online even when you use multiple browsers

"From the negative perspective, people can use our cross-browser tracking to violate users' privacy by providing customized ads," Yinzhi Cao, the lead researcher who is an assistant professor in the Computer Science and Engineering Department at Lehigh University, told Ars.

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI: Can the “Trickster” Crypto Help Restore Democratic Order to the Internet?

LOKI If you are new to LOKI, the Australian project is self described on their landing page as a “privacy network which will allow users to transact and communicate privately over the internet, providing a suite of tools to help maintain the maximum amount of anonymity possible while browsing, transacting and communicating online”.

Trading privacy for survival is another tax on the poor

Trading privacy for survival is another tax on the poor

“I can’t cross-examine an algorithm.” advertisement Personal data is used to deny low-income people access to resources or opportunities, but it’s also used to target them with predatory marketing for payday loans or even straight-up scams.

Google’s Nest fiasco harms user trust and invades their privacy

Google’s Nest fiasco harms user trust and invades their privacy

But, following a trust-shattering move by Google last month regarding its Nest Secure product, consensus on one issue has emerged: Companies shouldn’t ship products that can surreptitiously spy on users.

Google rolls out privacy tool for AI developers

Google rolls out privacy tool for AI developers

Google has released the TensorFlow Privacy tool, an update to its open source TensorFlow machine learning framework, that will allow developers to enhance the privacy of their AI ( artificial intelligence ) models. The use of differential privacy essentially means that AI models trained on user data can’t encode personally identifiable information.

Why the Debate Over Privacy Can't Rely on Tech Giants

Why the Debate Over Privacy Can't Rely on Tech Giants

It’s clear after this hearing that companies who deliberately over-collect data and sidestep user privacy are making a business choice, and they could choose to operate differently. Freshman Sen. Josh Hawley asked DeVries whether users can fully turn off all Google’s location tracking services on their Android phones.

The unauthorized sale of your health data is coming to an end

The unauthorized sale of your health data is coming to an end

Data brokers then aggregate this deidentified health information and sell it to third party buyers; for example Adam Tanner of the Harvard Institute for Quantitative Social Science estimates that a large pharmaceutical company might pay between $10 million and $40 million per year for data, consulting and services from Iqvia alone.

Your Health Data Are a Gold Mine for Advertisers

Your Health Data Are a Gold Mine for Advertisers

“We kept privacy in mind as we were building our KidsMD skills.” Privacy foregrounds the conversation as providers explore voice-enabled health care and balance legal concerns with giving sound medical advice.

Don’t be fooled: the main beneficiary of Mark Zuckerberg’s apparent embrace of privacy is Facebook, not you

Don’t be fooled: the main beneficiary of Mark Zuckerberg’s apparent embrace of privacy is Facebook, not you

Facebook says it will use end-to-end encryption for its private messaging – certainly good news for people living in countries with repressive governments that spy on their citizens.

Germany considers amendment to law which makes it illegal to run a Tor node or website

Germany considers amendment to law which makes it illegal to run a Tor node or website

PIA believes this proposed amendment to the German Criminal Code is not just bad for Tor, which was named specifically, but also for online privacy as a whole – and we’re not the only ones.

More