EPIC Asks UN to Question US About Privacy Violations by Private Firms

EPIC Asks UN to Question US About Privacy Violations by Private Firms

EPIC Asks UN to Question US About Privacy Violations by Private Firms As part of a routine review, EPIC asked the United Nations Human Rights Committee to question the US about the failure to protect individuals against privacy violations by private industry.

Ring let employees watch customer videos, claim reports

Ring let employees watch customer videos, claim reports

A former employee in Ukraine told The Information that “Workers could then access the system from any computer, at home or anywhere.” A Ring representative told The Intercept that the only videos employees view and annotate are those made public through Ring’s community watch app, Neighbors: We take the privacy and security of our customers’ personal information extremely seriously.

For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too

For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching Too

“If [someone] knew a reporter or competitor’s email address, [they] could view all their cameras.”” At the same time, the source said, Ring unnecessarily provided executives and engineers in the U.S. with highly privileged access to the company’s technical support video portal, allowing unfiltered, round-the-clock live feeds from some customer cameras, regardless of whether they needed access to this extremely sensitive data to do their jobs.

Privacy and elementary OS

Privacy and elementary OS

Some people coming from this world of vacuuming up data ask us: how does elementary know what features to develop, which areas to focus on, how many daily active users we have? Is elementary against responsible, privacy-first collection of useful data?

DuckDuckGo now fingerprinting visitors

DuckDuckGo now fingerprinting visitors

9jnc7 2018-12-19 07:02:23 UTC #1 DuckDuckGo is using the Canvas DOMRect API on their search engine. YaCy is a P2P search engine that can be accessed via a client proxy or websites offered by volunteers who allow access to their own installation.

EU to fund bug bounty programs for 14 open source projects starting January 2019

EU to fund bug bounty programs for 14 open source projects starting January 2019

The bug bounty programs are being sponsored as part of the third edition of the Free and Open Source Software Audit (FOSSA) project.

New Release: Tor 0.3.5.6-rc

New Release: Tor 0.3.5.6-rc

Packages should be available over the coming weeks, with a new alpha Tor Browser release by early February. Minor features (fallback directory list): Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in January 2018 (of which ~115 were still functional), with a list of 157 fallbacks (92 new, 65 existing, 85 removed) generated in December 2018.

Metadata

Metadata

Only upload files which were either created or downloaded inside the Whonix-Workstation and personally stripped of metadata. Anonymous photo sharing requires the user to consider both metadata and fingerprintable camera anomalies. MAT - Metadata Anonymisation Toolkit [ edit ]

Privacy Theater – How Privacy Companies Market and What Actually Protects You

Privacy Theater – How Privacy Companies Market and What Actually Protects You

The agency was a colossal government effort to create a national body to standardize security and more rigorously train staff to improve airline (and other transport) safety.

How to Choose an Operating System for Maximum Privacy

How to Choose an Operating System for Maximum Privacy

Let’s take a look at some of the more secure operating systems to enhance your privacy. And since it’s not used by amateur users, hackers don’t target Linux systems anyway. It’s another open source and free operating system that’s popular because of its integrated cryptography and security.

Necuno Mobile: An open phone with Plasma Mobile

Necuno Mobile: An open phone with Plasma Mobile

Necuno Solutions is working with open source mobile communities and intends to make their hardware a welcoming platform for Free and open source operating systems in the mobile ecosystem.

What Alphabet Won’t Tell You About the GDPR

What Alphabet Won’t Tell You About the GDPR

Search is a large driver of revenue and doesn’t require data but what other portions of Alphabet’s advertising model will be affected by the GDPR? In addition, Google AdWords, which is based off search intent, will provide a safe haven Google’s advertising revenue as this does not require the company to harvest private data.

Encryption Against Global Mass Surveillance

Encryption Against Global Mass Surveillance

Website: get.wire.com OS: Android, iOS, macOS, Windows, Linux, Web Linphone Linphone is an open source SIP Phone and a free voice over IP service, available on mobile and desktop environments and on web browsers.

Save Code Share!

Save Code Share!

As shown in the recently published White Paper (link), the current wording of Article 13 of the Copyright Directive Proposal will most likely disrupt the development of software and create important barriers for the completion of the European Single Market and the expansion of digital innovation.

Iridium Browser

Iridium Browser

It takes the Chromium code base, which is also used for the official Chrome browser, and enhances its security and sets certain policies by default. The Iridium Browser project is backed by the Open Source Business Alliance.

Bitwarden Completes Third-party Security Audit – Bitwarden Blog

In the interest of providing full disclosure, below you will find the technical report that was compiled from the team at Cure53 along with an internal report containing a summary of each issue, impact analysis, and the actions taken/planned by Bitwarden regarding the identified issues and vulnerabilities.

Microsoft made $1.3 billion in cash payments in GitHub deal

Microsoft made $1.3 billion in cash payments in GitHub deal

(Reuters) - Microsoft Corp (MSFT.O) said in a filing late Thursday it had made $1.3 billion in cash payments in connection to its acquisition of coding hosting startup GitHub. Software developers use GitHub to host and share code as they write it, often using it to distribute open source software.

Aether

Aether

Aether is currently available for Windows , Mac and Linux — we're still working on our ${OS} app. Aether is private by default, so that you can choose to be fully private, or fully public yourself. 👻 Ephemeral Aether keeps a 6 months of content by default.

How to test and verify the speeds of your VPN

How to test and verify the speeds of your VPN

Tests are run on Vultr VPS (Virtual Private Server) infrastructure. You will need to connect to the VPS you just created when the server has finished being built.

Google’s smart city dream is turning into a privacy nightmare

Google’s smart city dream is turning into a privacy nightmare

In a statement, the company said: "At last week's meeting of the Waterfront Toronto's Digital Strategy Advisory Panel, it became clear that Sidewalk Labs would play a more limited role in near-term discussions about a data governance framework at Quayside.

An open letter to Tim Cook, from

An open letter to Tim Cook, from

At /e/Foundation, we’re building a new mobile ecosystem for users first: it respects their personal data privacy, it’s open source, and we are making it as attractive as possible, for Mom and Dad users.

Why the NSA Called Me After Midnight and Requested My Source Code

Why the NSA Called Me After Midnight and Requested My Source Code

Maybe people would die, or at least Dave instilled that impression on me as he politely asked if I would be willing to give him my source code; all the while, apologizing for not being able to tell me anything more about the situation.

5 Security Vulnerabilities You Don’t Want to Overlook

Therefore, development and security teams can no longer overlook known security vulnerabilities in open source components. To combat vulnerabilities, many rely on platforms such as WhiteSource, an open source security management solution, which detects known vulnerabilities in real-time through the SDLC, including post-deployment.

Criptext launches the first encrypted email app on Linux

Criptext launches the first encrypted email app on Linux

Our goal since launching in August was to make Criptext a community-driven effort towards protecting email privacy and being available on Linux is the purest demonstration of this commitment. Aren’t there other secure email services out there that are open source?

The Privacy Conscious Android Setup

The Privacy Conscious Android Setup

Firefox – Backup browser only when I need all my bookmarks and use sites that require a password. – An alternative to Brave as a daily browser and has user activity tracking disabled by default that Firefox Focus includes but lacks ad and tracker blocking features like Brave.

How I Fully Quit Google (And You Can, Too) – Member Feature Stories – Medium

How I Fully Quit Google (And You Can, Too) – Member Feature Stories – Medium

One of the biggest challenges to quitting is the fact that most alternatives, particularly those in the open source of privacy space, are really not user friendly.

Tim Berners-Lee launches open source project Solid to decentralize the web and place users in control of data

Tim Berners-Lee launches open source project Solid to decentralize the web and place users in control of data

Tim Berners-Lee is famous for inventing the world wide web, and now he's ready to take things to the next level with an ambitious open source project called Solid.

‎Bitwarden Password Manager

‎Bitwarden Password Manager

Bitwarden is the easiest and safest way to store all of your logins and passwords while conveniently keeping them synced between all of your devices. Bitwarden stores all of your logins in an encrypted vault that syncs across all of your devices.

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Do you care about your privacy? Maybe it is time to set up your own Dropbox.

Personally I am a very huge user of Evernote for note taking available on a lot of my device and of Dropbox to have my files available anywhere and on all my devices.

Google China Prototype Links Searches to Phone Numbers

Google China Prototype Links Searches to Phone Numbers

Google built a prototype of a censored search engine for China that links users’ searches to their personal phone numbers, thus making it easier for the Chinese government to monitor people’s queries, The Intercept can reveal.

More