U.S. state of Arizona files consumer fraud lawsuit against Google

U.S. state of Arizona files consumer fraud lawsuit against Google

(Reuters) - Arizona filed a consumer fraud lawsuit against Alphabet Inc’s Google on Wednesday, alleging that the U.S. tech giant used “deceptive” and “unfair” practices to obtain the location data of users.

Google’s federated analytics method could analyze end user data without invading privacy

Google’s federated analytics method could analyze end user data without invading privacy

As an example, in a user study, Gboard engineers measured the overall quality of word prediction models against raw typing data held on phones.Beyond model evaluation, Google uses federated analytics to support the Now Playing feature on its Pixel phones, which shows what song might be playing nearby.

YouTube investigates automatic deletion of comments criticising China Communist party

YouTube investigates automatic deletion of comments criticising China Communist party

Luckey, a founder of the virtual reality group Oculus who is now works for a defence tech firm, tweeted: “YouTube has deleted every comment I ever made about the Wumao, an internet propaganda division of the Chinese Communist party,” and suggested the filtering appeared to be a new policy of censorship.

Top EU data protection agency under pressure to act against Internet giants as GDPR turns 2 years old

Top EU data protection agency under pressure to act against Internet giants as GDPR turns 2 years old

With its public statement, the Irish DPC is trying to signal that it is working hard on these big cases, but Schrems doesn’t think it is making enough progress.

House to vote on whether the FBI can access internet history without a warrant: Act now to Save Internet Privacy

House to vote on whether the FBI can access internet history without a warrant: Act now to Save Internet Privacy

Since Congress is likely voting tomorrow on the Lofgren-Davidson amendment to the PATRIOT Act, today is the day to contact your representatives and tell them how you’d like them to vote.

Thais Ditch Twitter for Blockchain-Based Social Network Minds

Thais Ditch Twitter for Blockchain-Based Social Network Minds

The update came days after Twitter announced in a blog post that the company had launched an official Twitter Thailand account and partnered with the Thai government and local NGOs. Achavanuntakul said in recent months, young users "who have been critical of the monarchy” on Twitter have received visits from the police at home.

Tech Expert: Privacy Is a Myth, so We Might as Well Contact-trace

Tech Expert: Privacy Is a Myth, so We Might as Well Contact-trace

Kevin Warwick, a cybernetics professor emeritus at the University of Reading, argues that while contact-tracing apps should be secure, people skittish about giving up privacy ought to adjust their priorities.

A dystopian look ahead at a lost decade of oligarchy, xenophobia, and soul-crushing surveillance

A dystopian look ahead at a lost decade of oligarchy, xenophobia, and soul-crushing surveillance

Left-wing fantasies By June 2020, as lockdowns began to ease, left-wing optimism remained that the pandemic would revive state power on behalf of the powerless, leading friends to fantasize about a renaissance of the commons and a capacious definition of public goods.

YouTube is deleting comments with two phrases that insult China’s Communist Party

YouTube is deleting comments with two phrases that insult China’s Communist Party

YouTube is automatically deleting comments that contain certain Chinese-language phrases related to criticism of the country’s ruling Communist Party (CCP).The Verge found evidence that comments were being deleted as early as October 2019, when the issue was raised on YouTube’s official help pages and multiple users confirmed that they had experienced the same problem.

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Now, a hacker or call them a threat actor is claiming to have access to a database with 500 million Facebook user data from 82 countries.Remember, third-party firms can use data scrapping, a fairly common practice to extract the personal information of users from websites like Facebook or Twitter.

Aarogya Setu, India’s contact-tracing app, goes open-source

Aarogya Setu, India’s contact-tracing app, goes open-source

According to Kant, 98% of Aarogya Setu installs are on Android devices, which explains the initial release of the Android client source code for the app.

The House Is Voting on Section 215 of the PATRIOT Act, Again. The Bill Still Needs More Reform

The House Is Voting on Section 215 of the PATRIOT Act, Again. The Bill Still Needs More Reform

Later this week, the House of Representatives is once again voting on whether or not to extend the authorities in Section 215 of the PATRIOT Act—a surveillance law with a rich history of government overreach and abuse, along with two other PATRIOT Act provisions, and possibly, an amendment.

Local News Stations Run Propaganda Segment Scripted and Produced by Amazon

Local News Stations Run Propaganda Segment Scripted and Produced by Amazon

Local news stations across the U.S. aired a segment produced and scripted by Amazon which touts the company's role in delivering essential groceries and cleaning products during the COVID-19 pandemic, and its ability to do so while "keeping its employees safe and healthy.".

We don’t track you. Nothing, zero, zilch.

We don’t track you. Nothing, zero, zilch.

Apps often monitor users, create profiles, and sell data to advertisers for profit.For a while we’ve been relying on a unique user counting request stored on your computer.So, we’ve baked a tracker blocker right into the browser.

In land of big data, China sets individual privacy rights

In land of big data, China sets individual privacy rights

BEIJING (Reuters) - China is poised to enshrine individuals’ rights to privacy and personal data for the first time, a symbolic first step as more of the country of 1.4 billion people becomes digitised - and more vulnerable to leaks and hacks.

How to Hide Secrets in Strings— Modern Text hiding in JavaScript

How to Hide Secrets in Strings— Modern Text hiding in JavaScript

Fortunately, we were able to add 4 more characters to our arsenal, a total of 6 invisible characters that we can now use to hide our secrets in strings.

China's coronavirus campaign offers glimpse into surveillance system

China's coronavirus campaign offers glimpse into surveillance system

While authorities have primarily used mobile location data and ID-linked tracing apps to flag people coming back from abroad for quarantine, the camera surveillance system has played a crucial role, according to officials, state media and residents.

Sen. Ron Wyden Wants to Stop the Government From Spying on Your Internet Searches

Sen. Ron Wyden Wants to Stop the Government From Spying on Your Internet Searches

Greer says Wyden's introduction of the amendment could be a way of alerting the public that intelligence agencies have already been collecting U.S. citizens' web search data.

Why Metadata Matters

Why Metadata Matters

Let’s take a look at how revealing metadata can actually be to the governments and companies that collect it: They know you rang a phone sex line at 2:24 am and spoke for 18 minutes.

How to Block Ads on your Smart TV (Samsung, LG, Roku and Sony)

How to Block Ads on your Smart TV (Samsung, LG, Roku and Sony)

Here are the 2 ways to block ads on your Samsung, LG, Sony and Roku Smart TVs: Filtering specific Ad URLs to your Home Internet RouterInstalling BlockADA app for Android (Works on Android TVs only) Now we will discuss each method in detail and explain all the steps required to effectively block all the annoying ads: METHOD-1: Blocking Ads with your Home Internet Router.

Fraudulent Ads Exploit COVID-19 Fears on Disney’s ESPN.Com

Fraudulent Ads Exploit COVID-19 Fears on Disney’s ESPN.Com

Fraudulent Ads Exploit COVID-19 Fears on Disney’s ESPN.Com. Scam advertisements across major media outlets originate from DoubleClick and Xandr/AppNexus.Unfortunately, other media outlets aren’t doing the same thing, and fake ads are spreading across major news sites that receive millions of visitors every month.

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge CEO: We Can Play Critical Role in Covid-19 Contact Tracing

Everbridge's products are used by governments and companies to assess risks such as terrorism and cyber-attacks and determine which they need to worry about; locate assets, customers and others that could be harmed; provide automated "standard operating procedures" to manage and respond to problems; and analyze how past threats were handled to create a better response for the next ones that come along, according to the CEO.In response to Covid-19, Everbridge launched a coronavirus data feed, said Meredith.

Breach Report: Staying Alert in the Face of Cyber Dark Ages

Breach Report: Staying Alert in the Face of Cyber Dark Ages

It is necessary to use protection services available: Breach Report helps businesses monitor and protect the accounts of their employees, partners, and clients against daily privacy threats occurring on the dark web.43% of cyber-attacks target small businesses , according to the 2019 Verizon Data Breach Investigation Report.

How to Stop Google From Tracking Your Location

How to Stop Google From Tracking Your Location

If, like most people, you thought Google stopped tracking your location once you turned off Location History in your account settings, you were wrong.

Inside the NSA’s Secret Tool for Mapping Your Social Network

Inside the NSA’s Secret Tool for Mapping Your Social Network

One of those documents, the first to be made public in June 2013, revealed that the NSA was tracking billions of telephone calls made by Americans inside the US.

$270 for 5G & 90hz screen smartphone: Honor X10's first impressions

$270 for 5G & 90hz screen smartphone: Honor X10's first impressions

But now the price of a 5G smartphone has dropped to less than 2,000 yuan (about 280 U.S. dollars) a piece, which is not dissimilar to that of mid-tier 4G devices.This trick, which has been applied to smartphones since mid-2018, sacrifices a bit of front-cam image quality for a notch-free front.

The Price is (Not) Right: Comparing Privacy in Free and Paid Apps (PETS ’20)

The Price is (Not) Right: Comparing Privacy in Free and Paid Apps (PETS ’20)

We use both static and dynamic analysis to examine 5,877 pairs of free Android apps and their paid counterparts for differences in data collection practices and privacy policies between pairs.

Privacy News Online | Weekly Review: May 22nd, 2020

Privacy News Online | Weekly Review: May 22nd, 2020

The Patriot Act is up for renewal in Congress as the USA FREEDOM Reauthorization Act of 2020 and Senate Majority Leader Mitch McConnell has added in an amendment that would open up internet history to the list of information that the FBI and DOJ would be able to access without a warrant.

OpenSAFELY: more proof that tackling the coronavirus pandemic does not require privacy to be compromised

OpenSAFELY: more proof that tackling the coronavirus pandemic does not require privacy to be compromised

For example, Vint Cerf, widely recognized as one of the creators of the Internet, has recently written an article for the Indian site Medianama entitled “Internet Lessons from COVID19“, in which he warns: Variations of the European Union’s General Data Protection Regulation (GDPR) are propagating around the world with good intent although implementation has shown some unintended consequences, not least of which may be the ability to share health information that would assist in finding a vaccine against SARS-COV-2.

Leaked Senate Talking Points Say Internet Surveillance Warrants Would Force FBI To Let Terrorists Bomb Things

Leaked Senate Talking Points Say Internet Surveillance Warrants Would Force FBI To Let Terrorists Bomb Things

A spokesperson for Sen. Ron Wyden, an intelligence committee member and a sponsor of the pro-privacy amendment the talking points seek to undermine, said that if an individual is a known spy, “then obviously there’s probable cause that he is an agent of a foreign power and a warrant is readily available.”.

More