The privacy risks of pre-installed software on Android devices

The privacy risks of pre-installed software on Android devices

Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them. On the one hand, the permission model on the Android operating system and its apps allow a large number of actors to track and obtain personal user information.

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

55 unique entities, owned by 46 parent companies, received or processed app user data, including developers and parent companies (first parties) and service providers (third parties). 37 (67%) provided services related to the collection and analysis of user data, including analytics or advertising, suggesting heightened privacy risks.

Facebook stored hundreds of millions of passwords unprotected

Facebook stored hundreds of millions of passwords unprotected

According to security reporter Brian Krebs, who cited a “senior Facebook insider”, “access logs showed some 2,000 engineers or developers made approximately nine million internal queries for data elements that contained plaintext user passwords”.

Facebook employees had access to millions of user passwords

Facebook employees had access to millions of user passwords

stored up to 600 million user account passwords without encryption and viewable as plain text to tens of thousands of company employees, according to a report Thursday by cybersecurity journalist Brian Krebs.

Law enforcement needs to protect citizens and their data

Law enforcement needs to protect citizens and their data

While the bill includes limited restrictions on law enforcement requests, the vague definitions and concentrated authorities give the Australian government sweeping powers that ultimately undermine the security and privacy of the very citizens they aim to protect.

The U.S. May Soon Have a De Facto National DNA Database

The U.S. May Soon Have a De Facto National DNA Database

One is traditional law enforcement DNA databases: Every state and the federal government has enacted legislation identifying whose DNA is subject to government collection and search for crime detection purposes, and each has limited its database to some subset of individuals arrested or convicted of crimes.

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Gmail's end-to-end encryption project is dead. Start using end-to-end encryption!

Two years ago, Google has silently handed the project E2EMail which was started to enable easy end-to-end encryption in Gmail via a browser extension to "the open source community". Three years earlier, Google had announced that they are building an end-to-end encrypted Chrome plugin to automatically encrypt emails between Gmail users.

FBI tracked Michael Cohen's phones with controversial device

FBI tracked Michael Cohen's phones with controversial device

Search warrant documents made public Tuesday show the FBI used highly secretive and controversial cellphone sweeping technology to zero-in on President Donald Trump's former personal lawyer when agents raided his New York City home, hotel room and office last year.

Amazon's Rekognition software lets cops track faces: Here's what you need to know

Amazon's Rekognition software lets cops track faces: Here's what you need to know

Civil liberties groups such as the ACLU have already raised concerns about the speedy adoption of facial recognition tech among US law enforcement agencies and the potential for its abuse, particularly against immigrants and people of color.

Google rolls out privacy tool for AI developers

Google rolls out privacy tool for AI developers

Google has released the TensorFlow Privacy tool, an update to its open source TensorFlow machine learning framework, that will allow developers to enhance the privacy of their AI ( artificial intelligence ) models. The use of differential privacy essentially means that AI models trained on user data can’t encode personally identifiable information.

Internet providers would need permission to use consumer data under proposed MT legislation

Internet providers would need permission to use consumer data under proposed MT legislation

HELENA — Rep. Daniel Zolnikov (R-Billings) says people have a right to be asked if internet service providers can use their personal data. Zolnikov said providers will still be able to use data to create profiles of people based on their browsing history to make targeted ads.

Facebook Data Gathering Reined in by German Facebook Ruling

Facebook Data Gathering Reined in by German Facebook Ruling

Upon completion of its investigation into the business practices of Facebook, the Bundeskartellamt last week found that the social media giant’s practices in relation to data obtained its services means that the platform users may be victims of ‘exploitative’ abuse.

Microsoft CEO Calls for Global Implementation of GDPR-like Legislation

Microsoft CEO Calls for Global Implementation of GDPR-like Legislation

Microsoft CEO Satya Nadella, speaking recently during an on-stage interview at World Economic Forum in Davos Switzerland, lead the calls for the global introduction of legislation that enshrines data privacy as a human right.

Use and Fair Use: Statement on shared images in facial recognition AI

Use and Fair Use: Statement on shared images in facial recognition AI

Some Flickr users were dismayed to learn that IBM had used their photos to train the AI, and had questions about the ethics, privacy implications, and fair use of such a dataset being used for algorithmic training.

New facial recognition bill would require consent before companies could share data

New facial recognition bill would require consent before companies could share data

A new bill introduced in the Senate today would prohibit commercial companies using facial recognition technology from sharing people’s data without their explicit consent.

How To Disable WebRTC In Your Browser

How To Disable WebRTC In Your Browser

It might be best here to just use the definition provided on the WebRTC website : “WebRTC is an open framework for the web that enables Real Time Communications in the browser.

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

Use credit instead of debit – When running a transaction as debit and entering your PIN, you are foregoing many of the protection features of the card per your user agreement.

Fixing the Most Despicable Website on the Planet – Facebook

Fixing the Most Despicable Website on the Planet – Facebook

If you are a Facebook user with the primary intent of just keeping up with friends and posting the occasional photo here and there, you might be wondering if this should worry you and if so, why.

How a Bitcoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps

How a Bitcoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps

After the police left, Mr. Lopp received a call threatening more mayhem if he did not make a large ransom payment in Bitcoin.

The Ten Commandments of crypto security – By Panama Crypto

The Ten Commandments of crypto security – By Panama Crypto

Two-factor authentication (2FA), keeps hackers, phishing, attempts at bay because once it is enabled on your email account, anybody that tries to break into your email would need to have physical or remote access to the device you have the 2FA app installed (either Google Authenticator or Authy) in order to produce the Time-based One-Time Passcode (TOTP) directly within the app.

Trump Administration Aims To Use Facebook To Spy On People Collecting Disability

Trump Administration Aims To Use Facebook To Spy On People Collecting Disability

The aim is to use a form of federal surveillance to monitor social media posts of Social Security disability payment recipients to see whether they’re really disabled.

Location Services: GPS-only no longer protects your privacy on Android 9 “Pie”, Huawei / Honor 10

Location Services: GPS-only no longer protects your privacy on Android 9 “Pie”, Huawei / Honor 10

Having agreed all this data collection, note that you can still turn off wi-fi scanning and Bluetooth scanning in the advanced settings of Google location services.

Facebook's Not Listening Through Your Phone. It Doesn't Have To

Facebook's Not Listening Through Your Phone. It Doesn't Have To

But unlike the Amazon Echo, which listens for just one of four trigger words, millions or perhaps billions of words and phrases could land you in a Facebook targeting segment. Because it has no specific trigger word for Facebook, your phone would need to listen for every targetable keyword.

China’s electric cars are government spies

China’s electric cars are government spies

Though the Volkswagen chief doesn’t explicitly say it, for automakers, providing electric-car data to China’s one-party government is just another cost of doing business in the country.

The ultimate guide to DuckDuckGo

Once you have it set as your default search engine, you’ll be able to use the URL bar in Chrome, Firefox, Safari, and others to search DuckDuckGo directly, just like you were with the (probably) default Google search engine.

★ A package to create personal data exports

★ A package to create personal data exports

use Spatie \ PersonalDataExport \ Jobs \ CreatePersonalDataExportJob ; dispatch( new CreatePersonalDataExportJob(auth()->user()); The package will create a zip containing all personal data.

The future of data ownership

The future of data ownership

Due to the centralized approach of storing user data, companies’ data centers have turned into golden trezors — a target for attackers, which leads to massive breaches. Here are the differences of storing user data locally on users’ device: It’s also better for businesses: How is this achieved?

China database lists 'breedready' status of 1.8 million women

China database lists 'breedready' status of 1.8 million women

An open database in China contains the personal information of more than 1.8 million women, including their phone numbers, addresses, and something called “BreedReady” status, according to a researcher.

Shuttering of NSA surveillance program emboldens privacy groups

Shuttering of NSA surveillance program emboldens privacy groups

A top national security aide to House Minority Leader Kevin McCarthy Kevin Owen McCarthyShuttering of NSA surveillance program emboldens privacy groups The Hill's 12:30 Report: House Dems pass electoral reform bill after difficult week House passes sweeping electoral reform bill MORE (R-Calif.) recently revealed on a podcast that, for the past six months, the spy agency hasn't used a program that gathers metadata on domestic text messages and phone calls.

VPNs Are No Privacy Panacea, And Finding An Ethical Operator Is A Comical Shitshow

VPNs Are No Privacy Panacea, And Finding An Ethical Operator Is A Comical Shitshow

VPNs Are No Privacy Panacea, And Finding An Ethical Operator Is A Comical Shitshow Privacy from the ain't-no-magic-bullet dept Given the seemingly endless privacy scandals that now engulf the tech and telecom sectors on a near-daily basis , many consumers have flocked to virtual private networks (VPN) to protect and encrypt their data.

More