VPNs Are No Privacy Panacea, And Finding An Ethical Operator Is A Comical Shitshow

VPNs Are No Privacy Panacea, And Finding An Ethical Operator Is A Comical Shitshow

VPNs Are No Privacy Panacea, And Finding An Ethical Operator Is A Comical Shitshow Privacy from the ain't-no-magic-bullet dept Given the seemingly endless privacy scandals that now engulf the tech and telecom sectors on a near-daily basis , many consumers have flocked to virtual private networks (VPN) to protect and encrypt their data.

Consumer Privacy in an Age of Commercial Unmanned Aircraft Systems: The Independent Review: The Independent Institute

Consumer Privacy in an Age of Commercial Unmanned Aircraft Systems: The Independent Review: The Independent Institute

Volume 23 Number 1 • Summer 2018 Subscribe Buy Single Issues Get the App All Issues: Consumer Privacy in an Age of Commercial Unmanned Aircraft Systems By Ryan Hagemann This article appeared in the Summer 2018 issue of The Independent Review The advent of the commercial drone will bring new challenges for consumer privacy and new rules for dealing with them.

Tech giants and civil liberty groups call out ghost cops and source code demands under Australian encryption laws

Tech giants and civil liberty groups call out ghost cops and source code demands under Australian encryption laws

A collective of companies and civil liberty groups including Apple, Amazon, Google, Microsoft, Facebook, Privacy International, Linux Australia, and the Electronics Frontier Foundation have issued a warning that requirements to silently add law enforcement into encryption chats could introduce vulnerabilities and create new risks to systems.

EPIC to FTC: After Home Spying Reports, Google Should Divest Nest

EPIC to FTC: After Home Spying Reports, Google Should Divest Nest

EPIC to FTC: After Home Spying Reports, Google Should Divest Nest Following reports that Google installed secret listening devices in the homes security product Nest, EPIC asked the Federal Trade Commission to require Google to spin-off Nest and to disgorge the data obtained from Nest users.

Signal >> Blog >> I link therefore I am

Signal >> Blog >> I link therefore I am

Previewing the future As time goes on, we may expand the list of sites where link previews are available with new additions that include the necessary meta tags and support HTTPS connections that are compatible with Signal’s privacy-enhancing proxy.

Apple’s Empty Grandstanding About Privacy

Apple’s Empty Grandstanding About Privacy

Companies such as Google and Facebook get access to iPhone users by offering their apps—Messenger, Gmail, Google Maps, and so on—for download from the Apple App Store. If Apple really objected to data-hungry business models, it could take much more aggressive action during app review.

Twitter warns that private tweets were public for years

Twitter warns that private tweets were public for years

These are external links and will open in a new window These are external links and will open in a new window Image copyright Reuters Image caption Twitter said it did not know how many people had their private messages exposed Private tweets sent by users of Twitter's Android app could have been exposed publicly for years.

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

(Raybaby did not respond immediately to a request for comment.) Here are some of the newest technologies to track and care for your infant: Video and audio monitors The classic audio-based baby monitor has been upgraded through enhanced sound quality and range.

It's complicated Facebook's terrible 2018

It's complicated Facebook's terrible 2018

Its “Year in Review” videos, every one personalized for each of the social network’s 2.2 billion users, are an annual tradition. Think of it as a thank-you gift for all that personal data you handed over. But what can one say about Facebook’s own year in review?

Amazon and Facebook Reportedly Had a Secret Data-Sharing Agreement, and It Explains So Much

Amazon and Facebook Reportedly Had a Secret Data-Sharing Agreement, and It Explains So Much

Amazon declined to tell the New York Times about its data-sharing deal with Facebook but “said it used the information appropriately.” I asked Amazon how it was using the data obtained from Facebook, and whether it used it to make connections like the one described by Santiago.

As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants

As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants

The privacy team had limited ability to review or suggest changes to some of those data-sharing agreements, which had been negotiated by more senior officials at the company.

GCHQ boosts powers to launch mass data hacking

GCHQ boosts powers to launch mass data hacking

“The bulk equipment interference power permits the UK intelligence services to hack at scale by allowing a single warrant to cover entire classes of property, persons or conduct,” explained Scarlet Kim, legal officer at Privacy International, which has taken the government to court over GCHQ’s hacking activities abroad.

UK Supreme Court considers whether spy court should be immune to legal probes

UK Supreme Court considers whether spy court should be immune to legal probes

The campaign group wants to launch a judicial review at the Investigatory Powers Tribunal (IPT) over a 2016 decision in a case probing the legalities of the UK spy agencies' computer hacking.

Lawmakers Drafting Bill That Would Allow Social Media Checks Before Gun Purchase

Lawmakers Drafting Bill That Would Allow Social Media Checks Before Gun Purchase

NEW YORK (WCBS 880) – Two New York lawmakers are working to draft a bill that would propose a social media check before a gun purchase.

Firefox, Chrome and the Future of Trustworthy Extensions

Firefox, Chrome and the Future of Trustworthy Extensions

“Beginning in Chrome 70, users will have the choice to restrict extension host access to a custom list of sites, or to configure extensions to require a click to gain access to the current page.” Meanwhile Mozilla will continue to look for ways Firefox can provide more permission control to a majority of extension users.

Employers embrace health apps

Employers embrace health apps

The Kaiser Family Foundation's annual review of employer-based insurance shows that 21% of large employers collect health information from employees' mobile apps or wearable devices, as part of their wellness programs — up from 14% last year.

Project Strobe: Protecting your data, improving our third-party APIs, and sunsetting consumer Google+

Project Strobe: Protecting your data, improving our third-party APIs, and sunsetting consumer Google+

This project looked at the operation of our privacy controls, platforms where users were not engaging with our APIs because of concerns around data privacy, areas where developers may have been granted overly broad access, and other areas in which our policies should be tightened.

Google confirms it's letting third parties scan your Gmail

Google confirms it's letting third parties scan your Gmail

In a letter to Senators which fell into the hands of CNN, Susan Molinari, VP of public policy and government affairs at Google confirmed: "Developers may share data with third parties so long as they are transparent with the users about how they are using the data"

‘After I jumped into a ride-share car, the driver said something that terrified me.’

‘After I jumped into a ride-share car, the driver said something that terrified me.’

It started off normal – I ordered the ride, waited for the driver, said hello, hopped in. “She told me she was sick the next day and didn’t need a ride to work,” he said.

The Current Status of WireGuard VPNs – Are We There Yet?

The Current Status of WireGuard VPNs – Are We There Yet?

WireGuard builds on these principles of simplicity and straightforward code that is well documented, and it brings it to VPNs. The goal of the project is be a simple VPN service that can be readily integrated directly into operating systems, with the aim of being faster and safer than current solutions.