You May Have Forgotten Foursquare, but It Didn’t Forget You

You May Have Forgotten Foursquare, but It Didn’t Forget You

“Harry spends a lot of time in Midtown, sometimes goes to parks, and rides the subway,” Crowley says, looking over the data Foursquare has assembled from the person’s use of popular apps and geotagging services.

Why Democracies Die: The Reason Privacy Is the Source of Power in the 21st Century

Why Democracies Die: The Reason Privacy Is the Source of Power in the 21st Century

He said that democracies have been formed through waves — that means, every time there’s been a liberal revolution that established a democracy, other countries tend to follow the pioneer and adopt a democratic process as well.

Pragmatic Cypherpunk’s Personal Backup

Pragmatic Cypherpunk’s Personal Backup

Borg is super flexible but it does not cover “the last mile” some users would expect — things like periodic running, default opinionated setup, and desktop notifications integration. It also offers opinionated borg configuration for pragmatic remote backups with focus on security and efficiency.

My own Creepy Facebook Surveillance Moment

My own Creepy Facebook Surveillance Moment

TL;DR: Blank Facebook account I opened 8.5 years ago and never used receives recommendation, out of the blue, to check out a small store I only just learned existed and started patronizing.

Tracking my phone's silent connections

Tracking my phone's silent connections

Looking at data flow The number of DNS queries is an easy start, but, next I wanted to learn more about the actual servers my phone is talking to.

Even Silicon Valley workers want more regulation of the tech industry

Even Silicon Valley workers want more regulation of the tech industry

Companies' massive profits continue to fuel tech industry salaries, pushing up housing and cost-of-living prices so high that a six-figure salary is now considered "low income." Edelman's surveys found that those prices are having adverse effects around California.

Forget privacy: you're terrible at targeting anyway

Forget privacy: you're terrible at targeting anyway

If you ask it what video a person like you wants to see next, it will recommend some political propaganda crap, because 50% of the time 90% of the people do watch that next, because they can't help themselves, and that's a pretty good success rate.

What to Do When You Want to Delete Yourself From the Internet

What to Do When You Want to Delete Yourself From the Internet

Social media platforms are where you've likely shared the most about yourself; WD Storage , which published the study this visually infographic is based on, says that 350 million photos are added to Facebook each day.

How your speakers could be turned into eavesdropping microphones

How your speakers could be turned into eavesdropping microphones

The researchers managed to use SPEAKE(a)R to retask a computer’s outputs to inputs, then to record audio when the headphones were in the output-only jack.

Opinion | Never Tweet

Opinion | Never Tweet

At first, the Twitter mob went after the kids from Covington Catholic High School. But in its zigs and zags, the Covington story made one thing clear: Twitter is ruining American journalism.

How to stop using social media

How to stop using social media

But I have gained a reasonable professional following on Twitter and LinkedIn, and a smaller one on Facebook (mostly because I’ve mostly used it for actual friends and family). I’m saying that email (and listservs) can probably be considered a sound substitute for social media.

Phone Swap: the dating show that swipes through your ex’s texts

Phone Swap: the dating show that swipes through your ex’s texts

Unlike Channel 4’s recent hit The Circle – in which contestants created their own potentially fake social media avatars, and questioned the nature of online connections – both the US and UK iterations of Phone Swap treat the content of peoples’ mobiles as an opportunity to gawp, flirt and jump to conclusions about everything from sexual preferences to drinking habits.

Archive

Archive

One thing I would like to note though, but I'm not sure if it has a place in the draft: the differential privacy aspects of DNS versus DNS over HTTPS.

So, is your smartphone really secretly listening to you?

So, is your smartphone really secretly listening to you?

This is where companies are trying to hold back on letting you know how much they actually know about you because they fear it will freak you out." According to Scanlon, services like Facebook, Instagram and Google are very good at guessing what you might be interested in because of location, biographical and interest-based information that you either freely give or allow it to collect.

FBI affidavit against Ryan S. Lin in cyberstalking case (2017)

FBI affidavit against Ryan S. Lin in cyberstalking case (2017)

reply ALittleLight 12 hours ago I opened the document expecting to sympathize with Lin. In my imagination this was some FBI surveillance state overreach, or "cyberharassment" thing getting overblown. reply favorited 12 hours ago > Provided the allegations are true, whatever sentence he gets will not be enough...

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

‘Extreme baby monitors’ claim to track your child’s breathing, heartbeat and every movement

(Raybaby did not respond immediately to a request for comment.) Here are some of the newest technologies to track and care for your infant: Video and audio monitors The classic audio-based baby monitor has been upgraded through enhanced sound quality and range.

Exclusive: Amazon says 100 million Alexa devices have been sold

Exclusive: Amazon says 100 million Alexa devices have been sold

Limp, a veteran of Amazon who started out building the Kindle, doesn’t seem to think so — or at least, he believes that it will play out differently from platform wars of the past.

How to Know if You’re Being Tracked on the Internet

How to Know if You’re Being Tracked on the Internet

How to stop my device from listening to my conversations Visit the app permission section on your phone and revoke mic permissions. Once you’ve updated the software, install a good anti-spyware app on your device.

DOOMBA

DOOMBA

I bring forth DOOMBA, a half-goat, half-script creature, with native binary backing for the expensive parts, to be offered in place of my firstborn on this fine Christmas Eve.In order to use DOOMBA and the rest of the new Roomba functionality, you'll need to download the latest Noesis.

How to delete your Facebook account in seven steps

How to delete your Facebook account in seven steps

Maybe it’s simply a realization that all the data you gave to Facebook is feeding a creeping system of surveillance capitalism and you don’t want to feed the beast anymore. Scroll to and tap Account Ownership and Control Facebook Settings 4. Tap Deactivation and Deletion Account Ownership and Control 5.

The Cost of Living in Mark Zuckerberg’s Internet Empire

The Cost of Living in Mark Zuckerberg’s Internet Empire

(Oprah might not be famous as a tech analyst, but she knows a thing or two about getting people to share their personal data.) Facebook has long since shown itself to be a conspiracy of moral ghouls harvesting human intimacy for ad dollars; as sickening as it is to imagine Netflix browsing your private messages, these new disclosures don’t change your basic understanding of the operation any more than, say, a snowstorm changes your understanding of December.

The Article the Internet Doesn’t Want You to Read

The Article the Internet Doesn’t Want You to Read

Staring at the screen that was propped up on a yellow pages (sign on the times?) on the rear end of the desk, I turned it on, waiting for it to do its thing, then connecting the modem, listening to that well known sound, opening up Internet Explorer and then navigating to one of the early web search engines, I can’t quite remember if it was Ask Jeeves or Web Crawler but then pausing for a moment…

How to Purify Your Device After Clicking a Phishing Link

How to Purify Your Device After Clicking a Phishing Link

Once you’ve realized that you clicked on a phishing link, the first thing you should do is disconnect from the internet. Next, install it on your suspicious device, ignoring any prompts to connect to the internet to update the program.

How To Sound Like A Cybersecurity Expert

How To Sound Like A Cybersecurity Expert

Now, you may not know what encryption is, and I certainly don’t, but what we do know is that it’s somehow important to cybersecurity experts. Sharing articles about concepts you don’t understand will allow you to rise to the top of the cybersecurity fake expert field.

Walmart patents biometric shopping cart to track your vitals

Walmart patents biometric shopping cart to track your vitals

It’s one thing if you want to track the speed of a cart or its route through a store for marketing purposes but a desire to collect a user’s vital signs under the guise that you’re doing so to help sick or elderly shoppers or otherwise improve customer service is outright disturbing.

How to Avoid Stingray Downgrade Attacks

How to Avoid Stingray Downgrade Attacks

Stingray devices make use of this vulnerability. Stingray devices are smarter than the apps and can easily outsmart the latter. How to stay safe from Stingray attacks

There’s No Such Thing as Anonymous Data. But This Is How They’re Playing us with It.

There’s No Such Thing as Anonymous Data. But This Is How They’re Playing us with It.

Because I’ve appealed to your most basic common sense reactions with a shallow argument (but worthwhile benefit — don’t get me wrong), and right here I’d have an excuse to use your data for other purposes.

Beginner’s Guide to VPN Encryption Protocols

Beginner’s Guide to VPN Encryption Protocols

Have you noticed options like PPTP, L2TP, or OpenVPN in your VPN software and wondered what they are? Any good VPN Company will give you a choice of protocols so you can select the right one for your needs.

What Privacy and Incognito Mode Can and Cannot Protect

What Privacy and Incognito Mode Can and Cannot Protect

When you don’t want your wife to know about the, er… objectionable websites you view, incognito browsing mode is the right tool for you. But if you still want to access content that you don’t want your network admins to know, you should use a VPN with incognito mode.

Your Face Could Soon Replace Your Oyster Card

Your Face Could Soon Replace Your Oyster Card

A prototype face-gate is being trialled in London as a way to pay for your travel without needing a card.

More