How can I block email trackers and read receipts?

How can I block email trackers and read receipts?

As well as simply knowing you've read the email, tracking pixels can be used for various other nefarious and intrusive means, as was proved last year by popular new email client SuperHuman.

Houseparty’s Terms of Service and Privacy Policy Analyzed

Houseparty’s Terms of Service and Privacy Policy Analyzed

Log Data may include information such as your IP address, browser type, operating system, location, your mobile carrier, device and application IDs, the Users with whom you video chat, access date and time spent on features of the Services and other statistics and Cookie information… [emphasis added].Why you should care: While you’re using Houseparty’s app, you’re being surveilled and analyzed.

Government is tracking Americans' cell phones to see how they move and spread coronavirus

Government is tracking Americans' cell phones to see how they move and spread coronavirus

The data comes from the mobile advertising industry, people familiar with the matter explained to the Wall Street Journal.The goal of the portal would be to help officials learn how COVID-19 is spreading across the United States.

Zoom Removes Code That Sends Data to Facebook

Zoom Removes Code That Sends Data to Facebook

On Friday video-conferencing software Zoom issued an update to its iOS app which stops it sending certain pieces of data to Facebook.

Telecoms across Europe are sharing phone location data with governments as a result of the COVID-19 pandemic

Telecoms across Europe are sharing phone location data with governments as a result of the COVID-19 pandemic

The European Data Protection Supervisor (EDPS) has stated that no privacy laws are being breached – as long as there are safeguards.A potential new norm that is not good for privacy: Telecoms sharing “anonymized” location data with governments.

>4,000 Android apps silently access your installed software

>4,000 Android apps silently access your installed software

More than 4,000 Google Play apps silently collect a list of all other installed apps in a data grab that allows developers and advertisers to build detailed profiles of users, a recently published research paper found.

Snowden warns government surveillance amid COVID-19 could be long lasting

Snowden warns government surveillance amid COVID-19 could be long lasting

During this pandemic, for example, governments might say they're worried about public health and could send an order to every fitness tracker to look at measures like pulse and heart rate, and then demand access to that kind of activity, he said.

Jennifer O'Connell: Covid-19 is normalising mass surveillance of citizens

Jennifer O'Connell: Covid-19 is normalising mass surveillance of citizens

Draconian new measures allowing the Minister for Health to detain people indefinitely or quarantine entire areas, passing through the Dáil on Thursday with virtually no resistance.

Microsoft pulls out of facial recognition startup AnyVision

Microsoft pulls out of facial recognition startup AnyVision

James Martin/CNET Microsoft has pulled its minority investment out of a facial recognition startup that made headlines last year for allegedly surveilling Palestinians, the tech giant said Friday.

Amazon, Microsoft, and Palantir will help the UK health service map its coronavirus response, raising privacy worries

Amazon, Microsoft, and Palantir will help the UK health service map its coronavirus response, raising privacy worries

Amazon, Microsoft, and Palantir have signed on to help create an interactive coronavirus response dashboard for Britain's National Health Service (NHS).The dashboard will pool data from the NHS and its partners and help healthcare workers make decisions about allocating resources.

Taiwan is using a phone location “electronic fence” to help police track quarantined individuals

Taiwan is using a phone location “electronic fence” to help police track quarantined individuals

The “electronic fence” uses mobile phone data to notify police if the cell phones of any people under mandatory quarantine leave their home areas.Using phone location data to track quarantined individuals is still concerning surveillance no matter the perceived public good.

Coronavirus delays the passage of the world’s most important new privacy law

Coronavirus delays the passage of the world’s most important new privacy law

However, as the Carnegie India article notes, there are some differences between the Personal Data Protection Bill 2019 and the GDPR: the bill gives India’s central government the power to exempt any government agency from the bill’s requirements.

Dozens of young women in South Korea were allegedly forced into sexual slavery on an encrypted messaging app

Dozens of young women in South Korea were allegedly forced into sexual slavery on an encrypted messaging app

Cho Joo-bin, a 24-year-old man, hosted online rooms on encrypted messaging app Telegram, where users paid to see young girls perform demeaning sexual acts carried out under coercion, according to South Korean police.

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

The VPN bypass bug in iOS 13.3.1 and later causes some internet connections to continue with their original, unencrypted connection – which is a security and privacy concern.Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization.

Coursicle  -  Loginless – A New Standard for User Identification

Coursicle - Loginless – A New Standard for User Identification

Option D (most convenient): if the user has ever provided us with their email or phone number, they can re-enter that PII and we'll send them a link they can use to associate their device with their UUID.

Trolls exploit Zoom privacy settings as app gains popularity

Trolls exploit Zoom privacy settings as app gains popularity

Working and socialising from home has brought new risks to everyday life, as webcam meetings and chatroom cocktail hours contend with privacy invasions, phishing attacks and “zoombombings” – uninvited guests abusing the popular video service to broadcast shocking imagery to all.

Employees at home are being photographed every 5 minutes by an always-on video service to ensure they're actually working — and the service is seeing a rapid expansion since the coronavirus outbreak

Employees at home are being photographed every 5 minutes by an always-on video service to ensure they're actually working — and the service is seeing a rapid expansion since the coronavirus outbreak

Sneek's user base has rapidly expanded in recent weeks as companies transition en masse to work-from home — signups have increased tenfold in in the past few weeks, cofounder Del Currie told Business Insider.

Hackers are targeting your kids to infect Android and Chromebook devices with malware

Hackers are targeting your kids to infect Android and Chromebook devices with malware

Security investigators from Check Point Research discovered 56 malware-infected Google Play apps.Before Google had a chance to pull them down, users already downloaded the apps one million times; 24 of those apps, Check Point Research discovered, targeted children.Hazum told Laptop Mag how Google Play users can protect themselves from Tekya malware.

Site to Site (Commercial) VPN vs Remote Access (Personal) VPN

Site to Site (Commercial) VPN vs Remote Access (Personal) VPN

A site to site VPN is usually used to connect an outside device to a network and is often used for commercial purposes.Examples of personal VPNs include Private Internet Access (a personal VPN service provider) – and Streisand VPN, a personal VPN that you can set up between two of your own devices.

Swedish Covert Surveillance of Data Act

Swedish Covert Surveillance of Data Act

In those cases where an organisation which is subject to confidentiality (see section 11) uses Mullvad as a permanent element in its operations, and if the service is used for any purpose of the operations’ activities or the service is specifically intended to be used in the operations, there is no possibility for law enforcement agencies to be granted authorisation for covert surveillance of data of data before it is encrypted by the service (or via, for example, remote control).

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption, voice calls, video calls and file transfers

Tox is a peer-to-peer instant messaging protocol with end-to-end encryption for Windows, Linux, macOS, Android and iOS.Any instant messaging protocol that uses a cloud-based connection, aka a server, is a centralized service.

Snowden warns: The surveillance states we’re creating now will outlast the coronavirus

Snowden warns: The surveillance states we’re creating now will outlast the coronavirus

Governments around the world are using high-tech surveillance measures to combat the coronavirus outbreak.“When we see emergency measures passed, particularly today, they tend to be sticky,” Snowden said in an interview with the Copenhagen International Documentary Film Festival.

How Canada Should Ensure Cellphone Tracking to Counter the Spread of Coronavirus Does Not Become the New Normal

How Canada Should Ensure Cellphone Tracking to Counter the Spread of Coronavirus Does Not Become the New Normal

For example, Israel has implemented a system that involves the collection and use of cellphone location data to identify at-risk individuals, who may receive text messages warning that they need to self-quarantine.

Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account

Zoom iOS App Sends Data to Facebook Even if You Don’t Have a Facebook Account

What the company and its privacy policy don't make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don't have a Facebook account, according to a Motherboard analysis of the app.

DOJ seeks new emergency powers amid coronavirus pandemic

DOJ seeks new emergency powers amid coronavirus pandemic

In one of the documents, the department proposed that Congress grant the attorney general power to ask the chief judge of any district court to pause court proceedings “whenever the district court is fully or partially closed by virtue of any natural disaster, civil disobedience, or other emergency situation.”.

Poland’s COVID-19 “selfie app” raises privacy questions – will everyone eventually be tracked?

Poland’s COVID-19 “selfie app” raises privacy questions – will everyone eventually be tracked?

While it’s perfectly fine for such an app to exist – especially as an alternative to using law enforcement man hours to physically check on at-risk quarantined patients, it would be a huge privacy concern if Poland decided to make every citizen download the COVID-19 selfie app.

Toronto, Canada is now using phone location data to track if people are congregating

Toronto, Canada is now using phone location data to track if people are congregating

This past Monday, Toronto Mayor Tory announced at a virtual TechTO meetup that the government has been receiving location data from wireless carriers and telecommunication companies in the area to show where people are still congregating and flouting social distancing – The Logic reports.

11 countries are now using people's phones to track the coronavirus pandemic, and it heralds a massive increase in surveillance

11 countries are now using people's phones to track the coronavirus pandemic, and it heralds a massive increase in surveillance

A new live index of ramped up security measures by Top10VPN details the countries which have already brought in measures to track the phones of coronavirus patients, ranging from anonymized aggregated data to monitor the movement of people more generally, to the tracking of individual suspected patients and their contacts, known as "contact tracing.".

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

Overall, 87 percent of the Alexa sites and 46.5 percent of the .com sites use one of the 72 libraries.Additionally, 9.7 percent of the sites in the study use two or more vulnerable library versions.

The Right to Anonymity is Vital to Free Expression: Now and Always

The Right to Anonymity is Vital to Free Expression: Now and Always

And yet, our right to anonymity online remains at risk.But most importantly, there are myriad reasons why anonymity and pseudonymity remain vital tools for free expression and safety.EFF was able to successfully appeal in District Court, however, and Darkspilver’s anonymity remains protected.

More