Sidewalk Labs’s ambitious smart city plans now face a legal battle

Sidewalk Labs’s ambitious smart city plans now face a legal battle

A civil liberties group in Canada is suing three tiers of government over potential privacy issues posed by Sidewalk Labs’s plan to develop a 12-acre smart city in Toronto , which will be approved or denied later this summer.

DEA Continues Mass Surveillance of Americans Phone Call Records

DEA Continues Mass Surveillance of Americans Phone Call Records

According to a report recently released by the Office of Inspector General of the United States Department of Justice, the United States Drug Enforcement Administration (DEA) is continuing to operate its mass surveillance program which collects billions of call detail records of Americans and foreigners every day.

Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

How to unlock an iPhone you've forgotten the password to, even if it's disabled

How to unlock an iPhone you've forgotten the password to, even if it's disabled

Dave Johnson/Business Insider Instead, you need to reset the iPhone to its factory settings and then restore your apps and data from a backup. After it's erased, it'll be returned to its factory settings and you can follow the directions to restore the iPhone with a recent backup.

Integrating Network-Layer Privacy Protections With Cryptocurrencies

Integrating Network-Layer Privacy Protections With Cryptocurrencies

While significant effort has focused on protocol-layer protections, publications mapping IP addresses through tracking transaction broadcast origins and subsequently making connections with identities (through public keys) have amplified concerns that protocol-layer solutions are not the only means needed to safeguard privacy.

Research: Classification of attacks on Tor clients and Tor hidden services

Research: Classification of attacks on Tor clients and Tor hidden services

This message will be routed from the entry node of the hidden service, which is controlled by the adversary, to the central server and will include information such as the circuit ID, the cell timestamp, the source IP address, and the circuit ID.

Californians Want and Deserve Stronger Privacy Laws

Californians Want and Deserve Stronger Privacy Laws

Sen. Jackson’s bill provides tools for the Attorney General’s Office to enforce the CCPA and hold companies accountable for their actions, and grants every person the right to take companies to court for violating their privacy rights.

DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

How to Stop Google’s Sensorvault From Sharing Your Location With Law Enforcement

How to Stop Google’s Sensorvault From Sharing Your Location With Law Enforcement

Google gathers that location history data you’ve provided into a database named “Sensorvault,” and law enforcement can query it with a warrant: For years, police detectives have given Google warrants seeking location data tied to specific users’ accounts.

How to Live Without Google and Other Evil Tech Giants

How to Live Without Google and Other Evil Tech Giants

Chapters: Operating Systems Mobile Operating Systems Mobile App Stores Desktop Operating Systems Web Browsing Web Browsers Browser Addons Search Engines Communication Mail Providers Mail Apps Instant Messaging Social Media Localization Video Video Players Video Streaming Movie/TV Streaming Audio Audio Players Music Stores/Streaming Photo More Operating Systems.

15 Months of Fresh Hell Inside Facebook

15 Months of Fresh Hell Inside Facebook

And so simultaneously the company mounted a huge effort, led by CTO Mike Schroepfer, to create artificial intelligence systems that can, at scale, identify the content that Facebook wants to zap from its platform, including spam, nudes, hate speech, ISIS propaganda, and videos of children being put in washing machines.

Feds Helping to Create 9,000 Spy Zones in U.S. Cities

Feds Helping to Create 9,000 Spy Zones in U.S. Cities

In three years, the city of Erie, Pennsylvania, will be transformed into a massive surveillance city equipped with facial recognition cameras, license plate readers and spying public Wi-Fi zones.

2018 Online Trust Audit and Honor Roll

2018 Online Trust Audit and Honor Roll

As in previous years, 100 baseline points can be earned in each of the three major assessment categories (consumer protection, site security and privacy).

APAC consumers have little trust in digital services

APAC consumers have little trust in digital services

Just 31 percent of consumers in Asia-Pacific believe their personal information will be managed in a trustworthy way by businesses offering digital services, with only 5 percent willing to transact with companies that offer cheaper but less trusted digital platforms.

A “Brave” New World

A “Brave” New World

So if you install Brave and spend time on , you can express thanks in the form of a tiny tip, right there in your browser. A way for the Internet Archive to support a like-minded tech organization, and at the very least, try out something new.

Wirecutter Weekly: How safe is your privacy in a smart home?

Wirecutter Weekly: How safe is your privacy in a smart home?

This great CNET piece reports that facial recognition in devices like the Nest Cam IQ, Honeywell Smart Home Security, and even the Sony Aibo robot dog don’t comply with Illinois’s Biometric Information Privacy Act, which “defines ‘biometric identifiers’ as retina scans, iris scans, fingerprints, hand scans, face scans and voiceprints.” As reported in the New York Times, cameras have been installed (but not yet activated, so they say) on planes.

Australian Child-Tracking Smartwatch Vulnerable to Hackers

Australian Child-Tracking Smartwatch Vulnerable to Hackers

(Photo: Troy Hunt) An Australian company that markets a smartwatch that lets parents monitor their children shut down its service on Monday after researchers revealed hackers could track a child's location, spoof the location, add themselves as a "parent" and view personally identifiable information associated with the account.

Privacy 2019: Tor, Meek & The Rise And Fall Of Domain Fronting

Privacy 2019: Tor, Meek & The Rise And Fall Of Domain Fronting

This allowed the creation of meek bridge relays on large clouds such as Google App Engine, Amazon CloudFront/EC2 and Microsoft Azure, hiding the actual target hostname behind domains such as , or various static asset CDNs. Domain fronting was nothing short of revolutionary for Tor users in high-risk countries.

Employee privacy is at stake as surveillance tech monitors workers

Employee privacy is at stake as surveillance tech monitors workers

Earlier this year, Amazon received a patent for an ultrasonic bracelet that can detect a warehouse worker's location and monitor their interaction with inventory bins by using ultrasonic sound pulses.

Google faces surge in police requests for mobile location data

Google faces surge in police requests for mobile location data

However, people don't necessarily realize that Google keeps the info for an indefinite period, or that the history is detailed enough to provide a picture of street-by-street movements to investigators.

Four Steps Facebook Should Take to Counter Police Sock Puppets

Four Steps Facebook Should Take to Counter Police Sock Puppets

Despite Facebook’s repeated warnings that law enforcement is required to use “authentic identities” on the social media platform, cops continue to create fake and impersonator accounts to secretly spy on users.

Big Tech Lobbying Gutted a Bill That Would Ban Recording You Without Consent

Big Tech Lobbying Gutted a Bill That Would Ban Recording You Without Consent

An Illinois bill that sought to empower average people to file lawsuits against tech companies for recording them without their knowledge via microphone-enabled devices was defanged this week after lobbying from trade associations representing Silicon Valley giants.

'A More Just and Equitable Future': Advocates Welcome Markey's Privacy Bill of Rights

'A More Just and Equitable Future': Advocates Welcome Markey's Privacy Bill of Rights

Dylan Gilbert, a policy fellow at the nonprofit Public Knowledge, said that "Senator Markey's Privacy Bill of Rights Act sets a strong, rights-based standard for consumer privacy protection under federal law that goes beyond mere notice and choice.".

How does it feel to be watched at work all the time?

How does it feel to be watched at work all the time?

Image copyright Robin Lubbock Image caption Humanyze's Ben Waber thinks firms need to find our more about how they function His company gathers "data exhaust" left by employees' email and instant messaging apps, and uses name badges equipped with radio-frequency identification (RFID) devices and microphones.

Juul launches a pilot program that tracks how Juul devices get in the hands of minors

Juul launches a pilot program that tracks how Juul devices get in the hands of minors

With Track & Trace, Juul is calling upon parents, teachers and law enforcement officials to come to the Juul Report web portal when they confiscate a device from a minor and input the serial number.

Future Android ‘system updates’ could be initiated from the Google Play Store [APK Insight]

Future Android ‘system updates’ could be initiated from the Google Play Store [APK Insight]

If Google Play is indeed referring to OS updates, the strings — at the very least — suggest that users could initiate downloads and installs for new versions of Android right from the Play Store.

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers. Critics say implementing the measures would be expensive and give vast censorship powers to the government’s new traffic monitoring centre.

Delhi HC directs YouTube to remove defamatory PewDiePie songs

Delhi HC directs YouTube to remove defamatory PewDiePie songs

The interim order was granted by a Single Judge Bench of Justice Jayant Nath in a suit preferred by T-Series owner Super Cassettes Pvt Ltd., seeking to permanently restrain Felix Arvid Ulf Kjellberg, better known as PewDiePie, from uploading the songs titled ‘T-Series Diss Track/Bitch Lasagna’ and ‘Congratulations’.

Google will now let you use your Android phone as a physical security key

Google will now let you use your Android phone as a physical security key

To make your Android phone your security key, you’ll just need to connect your phone through Bluetooth to a Chrome browser to verify logins. Other Android 7 and higher devices can still be used as two-factor authentication methods, but they’ll be required to sign in and tap a button.

Elizabeth Warren: If Data Gets Stolen, Throw Tech CEOs in Prison

Elizabeth Warren: If Data Gets Stolen, Throw Tech CEOs in Prison

Senator and presidential hopeful Elizabeth Warren wants tech leaders to be held accountable when user data that they’ve collected gets stolen or leaked. According to a bill Warren introduced Wednesday, executives of billion-dollar companies could be held criminally liable for data breaches — and perhaps even face jail time.

More