Reverse Engineering a Xinjiang Police Mass Surveillance App

Reverse Engineering a Xinjiang Police Mass Surveillance App

Launch Map. Human Rights Watch finds that officials use the IJOP app to fulfill three broad functions: collecting personal information, reporting on activities or circumstances deemed suspicious, and prompting investigations of people the system flags as problematic.

Delete These Sketchy Android Apps That Are Tracking You Without Permission

Delete These Sketchy Android Apps That Are Tracking You Without Permission

This particular instance is more alarming than previous—not only are some of the most-downloaded apps on the Google Play Store implicated in the report, they also happen to be developed by Chinese companies that may be sharing collected data with the Chinese government.

How to Protect Privacy in a Cashless Economy

How to Protect Privacy in a Cashless Economy

As stated by Jerry Brito of the Coin Center, “a cashless society is a surveillance economy.” Bank-mediated transactions enable unprecedented monitoring, and the “death of cash means the birth of perfect financial control.” For example, China’s Social-Credit System punishes behavior the regime deems unfavorable, aided by monitoring via payment platforms.

China is reportedly using US satellite technologies to bolster its surveillance capabilities

China is reportedly using US satellite technologies to bolster its surveillance capabilities

The Chinese government has been using a private company jointly owned by a U.S. investment firm and its Chinese counterpart to expand its surveillance and telecommunications capabilities using American technology, The Wall Street Journal reports.

Instead of surveillance, what if we told advertisers what they wanted to know?

Instead of surveillance, what if we told advertisers what they wanted to know?

As of October, the company has permanently eliminated its “Partner Categories” feature, which had enabled advertisers targeting hyper-specific user demographics to do so by purchasing access, through Facebook, to consumer data gathered by third-party brokers like Acxiom, Datalogix, Epsilon, BlueKai, Oracle, and others.

Verizon launches free service for identifying and blocking spam calls

Verizon launches free service for identifying and blocking spam calls

When activated, Verizon says the filter will let customers “get alerts when a call is likely spam, report unsolicited numbers, and automatically block robocalls based on their preferred level of risk.”.

Our Mission -

Our Mission -

In 2012, a report by the Federal Trade Commission recommended that the industry set up a public Web portal that would display the names and contact information of every data broker doing business in the United States, as well as describe consumers’ data access rights and other choices.

Finland to investigate Nokia-branded phones after data breach report

Finland to investigate Nokia-branded phones after data breach report

HELSINKI (Reuters) - Finland’s data protection ombudsman said on Thursday he would investigate whether Nokia-branded phones had breached data rules after a report said the handsets sent information to China.

John Oliver says he’s going to ‘unleash hell’ on FCC by creating his own robocalls

John Oliver says he’s going to ‘unleash hell’ on FCC by creating his own robocalls

Let’s dance, you and I.” Don’t miss: Here’s why you’re getting so many spam phone calls This isn’t the first time Oliver has slammed AT&T or the FCC.

Twitter will let users be much more specific when reporting tweets with personal information

Twitter will let users be much more specific when reporting tweets with personal information

Twitter is adding new options to its reporting process for tweets that share personal information, adding much more specific fields that users can highlight when submitting reports.

How much does your government spy on you? U.N. may rank the snoopers

How much does your government spy on you? U.N. may rank the snoopers

REUTERS/Kacper Pempel/Illustration/File Photo Joseph Cannataci, the U.N. special rapporteur on the right to privacy, submitted the draft questionnaire - touching on everything from chatrooms to systematic surveillance - to the U.N. Human Rights Council, and invited comments by June 30.

Google admits error over hidden microphone

Google admits error over hidden microphone

Image copyright Google Image caption The Nest Guard acts as a way to arm and disarm the firm's home security alarm system by use of a code or tap of a key fob In response to criticism, Google said on Tuesday: "The on-device microphone was never intended to be a secret and should have been listed in the tech specs.

Privacy groups accuse Facebook of deceiving children into spending parents' money

Privacy groups accuse Facebook of deceiving children into spending parents' money

A coalition of child and privacy advocates filed a complaint with the Federal Trade Commission (FTC) Thursday after court documents that were unsealed last month revealed employees were aware that young children were playing games on the Facebook app and that the company was making it harder for their parents to obtain refunds.

More than 800 data breaches reported to Australian privacy watchdog in 2018

More than 800 data breaches reported to Australian privacy watchdog in 2018

Data from the Office of the Australian Information Commissioner (OAIC) reveals that last year it received 812 notifications as part of the mandatory breach reporting regime. Tags privacy cyber security data breaches Office of the Australian Information Commissioner (OAIC)

Jeff Bezos says National Enquirer is threatening to publish his nude photos

Jeff Bezos says National Enquirer is threatening to publish his nude photos

Amazon CEO Jeff Bezos has published an astonishing personal blog post on the platform Medium detailing what he claims is extortion and blackmail on behalf of the tabloid National Enquirer.

Location Data Mishandling — A Reading List – FOAM

Location Data Mishandling — A Reading List – FOAM

— Facebook Filed A Patent To Calculate Your Future Location tech The methods described in three Facebook patent applications use your historical location data - and others' - to…www.buzzfeednews.com So far these two reports have been about downstream data mishandling — what happens several steps after the origin protocols capture and digest location data before selling it off to third parties.

Report: Facebook has been paying some teens for permission to track everything they do

Report: Facebook has been paying some teens for permission to track everything they do

Already under fire for apparently tricking kids into spending their parents’ money to play games on the social networking platform, Facebook now finds itself confronting a new privacy wrinkle that’s emerged and reportedly involves the company paying teenagers and young adults for permission to track everything they do on their phones.

Facebook paid teenagers to mine device data

Facebook paid teenagers to mine device data

"Despite early reports, there was nothing 'secret' about this; it was literally called the Facebook Research App. It wasn't 'spying' as all of the people who signed up to participate went through a clear on-boarding process asking for their permission and were paid to participate.

WiFi firmware bug affects laptops, smartphones, routers, gaming devices

WiFi firmware bug affects laptops, smartphones, routers, gaming devices

In a report published today, Selianin described how someone could exploit the Avastar firmware (based on a custom implementation of the ThreadX real-time operating system) to execute malicious code without any user interaction.

Victory: Federal Court in Seattle Will Begin Disclosing Surveillance Records

Victory: Federal Court in Seattle Will Begin Disclosing Surveillance Records

The public will learn how often federal investigators in Seattle obtain private details about your communications, such as who you called and when, as a result of a petition to unseal those records brought by EFF client The Stranger.

Tech skills in most demand this year: data, cloud and cybersecurity

Tech skills in most demand this year: data, cloud and cybersecurity

Almost every job in tech now requires security awareness and basic know-how." The Hays report, based on 2,000 companies, finds that 70 percent of IT employers say they face a moderate-to-extreme skills shortage of IT professionals.

Call for testing: simplified installation method

Call for testing: simplified installation method

USB images instead of ISO images We need your help to test the simplified installation methods of Tails that we will release with 3.12 on January 29.

Nova warns listeners of data breach affecting 250,000 Australians

Nova warns listeners of data breach affecting 250,000 Australians

Nova chief executive Cathy O’Connor said in a statement on Thursday that individuals were being notified about the steps they can take, with the disclosed information varying from person to person.

Private Winten: new Windows 10 privacy tweaker with firewall

Private Winten: new Windows 10 privacy tweaker with firewall

Private Winten is a new open source software program to adjust privacy and other settings on devices running Microsoft's Windows 10 operating system. The software program has two main functions: provide users with access to privacy related settings, and act as a firewall frontend to block outbound connections by default.

Apple received over 32,000 user data requests in six months

Apple received over 32,000 user data requests in six months

According to the report, which covers the first half of this year, Apple received 32,342 demands for user data from governments -- up 9 percent from the previous period -- spanning access to 163,823 devices.

In revamped transparency report, Apple reveals uptick in demands for user data

In revamped transparency report, Apple reveals uptick in demands for user data

The company also said it received between 0 and 499 national security orders, including secret rulings from the Foreign Intelligence Surveillance Court, affecting 1,000 and 1,499 accounts.

Apple changes how it reports U.S. national security requests

Apple changes how it reports U.S. national security requests

(Reuters) - Apple Inc (AAPL.O) on Thursday changed how it reports on U.S. national security requests for user data, bringing its procedures more in line with those of technology rivals such as Microsoft Corp (MSFT.O) and Alphabet Inc’s (GOOGL.O) Google.

Facebook's bad news from the last 24 hours, ranked

Facebook's bad news from the last 24 hours, ranked

Late on Tuesday, the New York Times reported that Facebook entered into data-sharing agreements with fellow tech companies that looked a lot like selling our data in exchange for, not money, but access to more of our data.

Target is really, really into surveillance

Target is really, really into surveillance

Target calls its private fusion centers "investigations centers" — the company has people in these centers working 24/7 to monitor surveillance operations at its hundreds of stores nationwide using high tech tools, even satellite imagery.

Starwood Reservation Database Security Incident

Starwood Reservation Database Security Incident

If you are a resident of West Virginia, you have the right to ask that nationwide consumer reporting agencies place "fraud alerts" in your file to let potential creditors and others know that you may be a victim of identity theft, as described below.

More