California Assembly’s Privacy Committee Votes to Weaken Landmark Privacy Law

California Assembly’s Privacy Committee Votes to Weaken Landmark Privacy Law

The California State Assembly’s Privacy and Consumer Protection Committee today capitulated to industry complaints that our privacy is inconvenient for its bottom line. It voted to advance five bills opposed by privacy advocates that would undermine the landmark California Consumer Privacy Act (CCPA) and put companies before consumers.

Tomorrow, Congress Votes on Net Neutrality on the House Floor! Hear Directly from Members of Congress at 8pm ET TODAY on Reddit, and Learn What You Can Do to Save Net Neutrality!

Tomorrow, Congress Votes on Net Neutrality on the House Floor! Hear Directly from Members of Congress at 8pm ET TODAY on Reddit, and Learn What You Can Do to Save Net Neutrality!

Many people still aren’t aware of the fight for Net Neutrality, and don’t realize that it will impact them in very real ways– especially those Americans living in rural areas who have the least choice when it comes to internet service providers.

Now you can have your own channel inside Facebook to keep your messages and posts private

Now you can have your own channel inside Facebook to keep your messages and posts private

Mark Nadal, a self-described “political activist fighting against surveillance capitalism,” today unveiled Private Party, a disarmingly simple protocol that evades the data capture used by tech giants.

DEA Never Checked If Its Massive Surveillance Operations Are Legal, Watchdog Says

DEA Never Checked If Its Massive Surveillance Operations Are Legal, Watchdog Says

The administration set no specific standards of proof for issuing subpoenas, and officials often justified data collection using “generic” and “cursory” explanations, the IG found.“The information provided [in subpoena documents] often lacks specificity sufficient to establish the particularized facts or basis for connecting the target number to a drug investigation, even if such review had occurred,” investigators said.

Privacy News Daily | March 27, 2019

Privacy News Daily | March 27, 2019

Microsoft is just one of many companies that are uncomfortable storing company data in Australia despite new laws. Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization.

FTC announces inquiry into the privacy practices of broadband providers

FTC announces inquiry into the privacy practices of broadband providers

The Federal Trade Commission today announced a broad inquiry into the privacy practices of internet service providers requesting large companies like AT&T, Verizon, and T-Mobile to hand over nonpublic information describing how they handle consumer data.

IBM’s photo-scraping scandal shows what a weird bubble AI researchers live in

IBM’s photo-scraping scandal shows what a weird bubble AI researchers live in

On Tuesday, NBC published a story with a gripping headline: “Facial recognition’s ‘dirty little secret’: Millions of online photos scraped without consent.” I linked to it in our last Algorithm issue, but it’s worth a revisit today.

Why an internet regulator is a bad idea

Why an internet regulator is a bad idea

Like Ofcom, the Lords committee rejects the idea that the internet is different from other media. The Lords committee report suggests that the spread of restrictions on free speech from one medium to another is both inevitable and desirable.

'Yelp for conservatives' MAGA app leaks users data

'Yelp for conservatives' MAGA app leaks users data

ZDNet has contacted 63red and its founder about Baptise's findings earlier today so the company can take action and update its app to protect users' data.

The Rise Of Totalitarian Technology

The Rise Of Totalitarian Technology

The TSA operates its own total tech program, called Quiet Skies, which monitors and flags travelers based on “suspicious” behavior patterns . The future of total tech in America and elsewhere in the west will be a battle between the drive for efficiency and the preservation of privacy and autonomy.

Twitter will let users be much more specific when reporting tweets with personal information

Twitter will let users be much more specific when reporting tweets with personal information

Twitter is adding new options to its reporting process for tweets that share personal information, adding much more specific fields that users can highlight when submitting reports.

Why Democracies Die: The Reason Privacy Is the Source of Power in the 21st Century

Why Democracies Die: The Reason Privacy Is the Source of Power in the 21st Century

He said that democracies have been formed through waves — that means, every time there’s been a liberal revolution that established a democracy, other countries tend to follow the pioneer and adopt a democratic process as well.

We met to discuss BBFC's voluntary age verification privacy scheme, but BBFC did not attend

We met to discuss BBFC's voluntary age verification privacy scheme, but BBFC did not attend

For PCI DSS, the banks and their customers have more to lose than the processors For Age Verification, site users have more to lose than the processors, however only the processors seem likely to be involved in setting the standard We look forward to BBFC agreeing to meet us to discuss the outcome of the roundtable we held about their scheme, and to discuss our concerns about the new voluntary privacy standard.

The Dark Sides of Modern Cars: Hacking and Data Collection

The Dark Sides of Modern Cars: Hacking and Data Collection

Munagala said the auto and tech industries realize they must achieve certain benchmarks of security and privacy to fully monetize this wellspring of operational and personal data, collected in real time.

A third of all Chrome extensions request access to user data on any site

A third of all Chrome extensions request access to user data on any site

The results of this study are made available today on the CRXcavator web portal , where users can check security reports about their favorite extension, or submit an extension ID and have it scanned if Duo researchers missed it during their Web Store analysis.

How State and Federal Governments Are Responding to Concerns about Data Privacy

How State and Federal Governments Are Responding to Concerns about Data Privacy

As any lawyer will tell you, privacy has always been a tricky issue to pin down, and the digital age has made that even more obvious, as consumers seem both more willing than ever to share private information about themselves freely online and simultaneously more concerned that such information might be used improperly.

Microsoft brings Windows Timeline support to Chrome with Web Activities extension

Microsoft brings Windows Timeline support to Chrome with Web Activities extension

The Timeline feature of Windows 10 makes it easier to work on multiple computers by synchronizing activity so you can move between machines and pick up from where you left off -- although it can also prove useful on a single computer.

Data breach monitoring for emails

Data breach monitoring for emails

You’re always in control It’s important to note that one can always retract their email address from Badrap.io’s email data breach monitoring. I’m not gonna give my email inbox to anyone By giving another person permission to monitor your email address for data breaches, you’re not giving access to your actual email inbox.

Thispersondoesnotexist.com is face-generating AI at its creepiest

Thispersondoesnotexist.com is face-generating AI at its creepiest

A couple of years back TNW reported on a new generative adversarial network (GAN) the company developed. One set of algorithms (a generator) tries to create something – in this case a human face – while another set (a judge) tries to determine if it’s a real image or a fake one.

University Buys 14.4 Petabyte Bandwidth to Boost ‘Anonymous’ Torrent Client

University Buys 14.4 Petabyte Bandwidth to Boost ‘Anonymous’ Torrent Client

The Tribler lab at Delft University of Technology has sold part of its Bitcoin stash to purchase bandwidth for its anonymous torrent client. Professor Johan Pouwelse, leader and founder of the Tribler project, informs us that his lab at Delft University of Technology has bought 14.4 petabytes of Internet bandwidth.

Apple’s power over Facebook ought to worry the rest of us

Apple’s power over Facebook ought to worry the rest of us

The argument against Facebook’s market research effort goes something like this: at a time when it faces mounting concerns over its data-collection practices, the company made an end-run around Apple developer policies to slurp up some of the most sensitive data a person has, including some belonging to teenagers.

Engineers translate brain signals directly into speech

Engineers translate brain signals directly into speech

"The sensitive vocoder and powerful neural networks represented the sounds the patients had originally listened to with surprising accuracy." Dr. Mesgarani and his team plan to test more complicated words and sentences next, and they want to run the same tests on brain signals emitted when a person speaks or imagines speaking.

How your speakers could be turned into eavesdropping microphones

How your speakers could be turned into eavesdropping microphones

The researchers managed to use SPEAKE(a)R to retask a computer’s outputs to inputs, then to record audio when the headphones were in the output-only jack.

Data Privacy Week: Privacy in Public Spaces

Data Privacy Week: Privacy in Public Spaces

The case emerged from a series of Freedom of Information (FOI) requests submitted by PI to police forces across the UK to find out which ones among them had purchased IMSI catchers.

Data Privacy Day: Why privacy matters and why it is time to fight for it.

Data Privacy Day: Why privacy matters and why it is time to fight for it.

In fact, we are developing Tutanota to protect our right to privacy, to protect freedom of speech, and, ultimately, to protect democracy itself. The only privacy-preserving technology we have to stop this surveillance machine is encryption: “Every time you use encryption, you're protecting someone who needs to use it to stay alive”, says Bruce Schneier .

We need to own our data as a human right—and be compensated for it

We need to own our data as a human right—and be compensated for it

They will become the most valuable companies in the world by providing beneficial new uses of data and AI for people, based on a combination of trust, services that improve one’s life and the involvement of communities.

DuckDuckGo switches to privacy-focused Apple Maps to ‘set a new standard of trust online’

DuckDuckGo switches to privacy-focused Apple Maps to ‘set a new standard of trust online’

Screen Cleaner DuckDuckGo shared the news on its blog today : The company said it is excited to be working with Apple to “set a new standard of trust online, and we hope you’ll enjoy this update.” It is also seeking feedback from users to help improve searches.

Privacy for all Android Apps

Privacy for all Android Apps

In order to encrypt a text, Oversec shows a button next to an active input field. After having entered the secret text, tapping that button makes Oversec read the text, encrypt it and put back the encrypted text into the field. Oversec also features a unique way of encoding encrypted messages.

Privacy Inequality: The Most Brutal Form of Inequality You’ve Ever Imagined

Privacy Inequality: The Most Brutal Form of Inequality You’ve Ever Imagined

But the one that’s coming will intensify this situation in every way, dehumanizing the people who won’t be able to afford to pay for privacy. 3. Dehumanizing people: The Protected and The Predictable What’s happening now isn’t just that data increases its value over time.

Security researcher cracks Google's Widevine DRM (L3 only)

Security researcher cracks Google's Widevine DRM (L3 only)

Image: Widevine team A British security researcher has cracked the L3 protection level of Google's Widevine digital rights management (DRM) technology. Because of the varying security levels, which exposes the DRM-encrypted content to attacks, service providers deliver audio and video streams with varying quality levels, with L3 receiving the lowest.

More