Privacy Talks | Interview with Josh Aas from Let’s Encrypt

Privacy Talks | Interview with Josh Aas from Let’s Encrypt

Timestamp Links & Questions: [] – Could you tell us what Let’s Encrypt does and what led you to co-found it?[] = Could you give a quick explainer of what HTTPS is and what role Let’s Encrypt plays in enabling HTTPS?Learn more about Let’s Encrypt at:

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Advertisement Advertisement An archived record of the technology shows it can perform such tasks as "glasses inspection", "smile detection", whether the subject is "ethnic" and, specifically, "Is it Uighur".Consequently, if a Uighur livestreams a video on a website signed up to Cloud Shield, the software can detect that the user is Uighur and flag the video for review or removal, IPVM researcher Charles Rollet told Reuters.

Before Envelopes, People Protected Messages With Letterlocking

Before Envelopes, People Protected Messages With Letterlocking

To guard her final missive from prying eyes, the queen used a “butterfly lock”—one of hundreds of techniques catalogued by Dambrogio, collaborator Daniel Starza Smith, and their research team in a fast-growing dictionary of letterlocking.

Here’s how to get all the data that Google has on you

Here’s how to get all the data that Google has on you

But while another company with questionable privacy practices Facebook occupies the social level of human behavior, Google with its Search can reach the deepest personal layers of a person.Step 2: Go to the to use the new Google Takeout feature.Be aware that extracting your data and deleting it are two different processes.

Derek McMinn: Surgeon ‘hoarded thousands of body parts over 25 years'

Derek McMinn: Surgeon ‘hoarded thousands of body parts over 25 years'

How Birmingham hospital staff stayed silent for decades as surgeon ‘harvested body parts’Derek McMinn: The surgical pioneer facing a scandalAnother surgeon raises serious questions for private hospital regulationHowever, it is understood that the full scale of McMinn’s actions – dating back to the 1990s – was kept from some regulators until the The Independent began making inquiries in the past week, despite completion of the internal review in October last year.

Instagram kept deleted photos and messages on its servers for more than a year

Instagram kept deleted photos and messages on its servers for more than a year

But when security researcher Saugat Pokharel requested a copy of photos and direct messages from the photo-sharing app, he was sent data he’d deleted more than a year ago, showing that the information had never been entirely removed from Instagram’s servers.

The changing face of privacy in a pandemic

The changing face of privacy in a pandemic

China’s cavalier approach to privacy has seen the country deploy drones, artificial intelligence, and security cameras to enforce quarantines and monitor public spaces.There are two main approaches to contact tracing apps, and both versions rely on anonymized IDs to record interactions with nearby devices, which allows for complete privacy.

Over 12,000 mistakenly quarantined by phone tracking, Health Ministry admits

Over 12,000 mistakenly quarantined by phone tracking, Health Ministry admits

Get The Times of Israel's Daily Edition by email and never miss our top stories Free Sign Up. Tens of thousands of Israelis attempted to appeal after the phone tracking system identified them as needing to quarantine and about half the appeals were upheld, Ayelet Grinbaum, who was representing the Health Ministry at the hearing, told the Knesset Foreign Affairs and Defense Committee.

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Prompted by the post, many users noticed that the storage scanner in the Device Care section included a little note: “powered by 360.” Even in China, Qihoo 360 is well known for its past privacy transgressions and controversies and it’s understandable why Samsung users would be incredibly concerned that anything at all from Qihoo is preinstalled on their phone.

People getting rid of Fitbits after Google

People getting rid of Fitbits after Google

"With news of the acquisition of your company, I intend to sell my Fitbit & delete my account," said a tweet from Tanya Janca, which received several hundred retweets and likes.

America’s largest companies push for federal online privacy laws to circumvent state regulatory efforts

America’s largest companies push for federal online privacy laws to circumvent state regulatory efforts

Chief executives at Amazon, AT&T, Dell, Ford, IBM, Qualcomm, Walmart and other leading financial services, manufacturing and technology companies have issued an open letter to congressional leadership pleading with them to take action on online privacy, through the pro-industry organization, The Business Roundtable.

Facebook on the hook as states launch competition, privacy probe

Facebook on the hook as states launch competition, privacy probe

"I’m launching an investigation into Facebook to determine whether their actions endangered consumer data, reduced the quality of consumers’ choices, or increased the price of advertising," New York attorney general Letitia James said this morning.

Another Federal Court Allows Warrantless Cellphone Searches at U.S. Border

Another Federal Court Allows Warrantless Cellphone Searches at U.S. Border

Unlike probable cause, which is the standard required for obtaining a search warrant, reasonable suspicion is a more lenient rule that lets law enforcement officials conduct searches without getting a warrant first.

Sending encrypted data with sound

Sending encrypted data with sound

With this question in mind, let’s take a look at the properties of sound and how industry-standard encryption can be applied to acoustic data transfer to render it secure and safe from the risk of prying ears.

Microsoft Quietly Says it Keeps and Transcribes Your Conversations —Sometimes Even if You Chose Not to Let Them

Microsoft Quietly Says it Keeps and Transcribes Your Conversations —Sometimes Even if You Chose Not to Let Them

Following in the footsteps of other large corporations such as Facebook, Google, Apple and Amazon; Microsoft silently updated its privacy statement admitting it has a group of people listening to users' conversations and interactions through its platform —and transcribing part of those dialogs:Our processing of personal data for these purposes includes both automated and manual (human) methods of processing .

IOS 13 privacy feature will force total overhaul for Facebook apps

IOS 13 privacy feature will force total overhaul for Facebook apps

VoIP services ostensibly stay running in the background so they can connect calls quickly, but they also lets those apps collect information about what users are doing on their devices.

Data isn't the new oil, it's the new CO2

Data isn't the new oil, it's the new CO2

The line of inquiry defending pervasive surveillance in the name of “individual freedom” and individual consent is tired and should be retired.But first let’s all admit that the line of inquiry defending pervasive surveillance in the name of “individual freedom” and individual consent gets us nowhere closer to understanding the threats we are facing.

Siri ‘regularly’ records sex encounters, sends ‘countless’ private moments to Apple contractors

Siri ‘regularly’ records sex encounters, sends ‘countless’ private moments to Apple contractors

They claimed accidental activations are much more frequent than Apple lets on, especially with Apple Watch users – and wants the company to own up to the problem.“There have been countless instances of recordings featuring private discussions between doctors and patients, business deals, seemingly criminal dealings, sexual encounters and so on.

ALA urges LinkedIn Learning to reconsider changes to terms of service that impair library users’ privacy rights

ALA urges LinkedIn Learning to reconsider changes to terms of service that impair library users’ privacy rights

“The requirement for users of LinkedIn Learning to disclose personally identifiable information is completely contrary to ALA policies addressing library users’ privacy, and it may violate some states’ library confidentiality laws,” said ALA President Wanda Kay Brown.

Google workers listen to your “OK Google” queries—one of them leaked recordings

Google workers listen to your “OK Google” queries—one of them leaked recordings

Google today defended its practice of having workers listen to users' Google Assistant queries, following the leak of 1,000 voice recordings to a media outlet. Google's blog post today said it uses "a wide range of safeguards to protect user privacy throughout the entire review process.".

Mozilla-central: changeset 480087:caacd1cb3ec10b6d39a4fbdc5eb09a7a703d87c3

Mozilla-central: changeset 480087:caacd1cb3ec10b6d39a4fbdc5eb09a7a703d87c3

QueryInterface(Ci.nsIHttpChannel); + equal(httpChannel.getRequestHeader("Cookie"), "type=chocolate-chip", "The header should be sent"); + .removeObserver(cookieExpectedObserver, "http-on-modify-request"); + cookieExpectedDeferred.resolve(); + } + .addObserver(cookieExpectedObserver, "http-on-modify-request"); + await fetch(serverUrl); + await cookieExpectedDeferred.promise; + + // A request through the NormandyApi method should not send that cookie + const cookieNotExpectedDeferred = PromiseUtils.defer(); + function cookieNotExpectedObserver(aSubject, aTopic, aData) { + equal(aTopic, "http-on-modify-request", "Only the expected topic should be observed"); + let httpChannel = aSubject.

Flame, the most sophisticated cyber espionage tool ever made

Flame, the most sophisticated cyber espionage tool ever made

Furthermore, different modules can be installed on request, making this software modifiable depending on the configuration of the machine it infects, highly unusual behavior for malware;Can replicate itself and delete itself and all gathered information on Kill command.

Ajit Pai Is Still Withholding Facts About Location-Data Abuse From Fellow Commissioners

Ajit Pai Is Still Withholding Facts About Location-Data Abuse From Fellow Commissioners

At an oversight hearing last month, House lawmakers pressed Chairman Ajit Pai to respond to charges that his office had refused to provide the Democratic commissioners with access to requested documentation, including any letters of inquiry the FCC might’ve sent to companies under suspicion of illegally selling location data derived from consumers’ cellphones.

UK “Ghost Proposal” would allow secret government participation in private calls and chats

UK “Ghost Proposal” would allow secret government participation in private calls and chats

GCHQ (Government Communications Headquarters) is a UK government intelligence organization similar to the U.S. National Security Agency (NSA).The Letter, spearheaded by Sharon Bradford Franklin and Andi Wilson Thompson of New America’s Open Technology Institute, provides insight into how the Ghost Proposal would allow government agents to slip unseen into private encrypted communications:The “ghost key” proposal put forward by GCHQ would enable a third party to see the plain text of an encrypted conversation without notifying the participants.

Gmail wittingly storing your online purchase data for years

Gmail wittingly storing your online purchase data for years

Simply put: there is no mass-delete option and one has to go one by one to delete each product history which means the process requires manually deleting hundreds or thousands of emails depending on how much you shop online and whether you had purchase receipts sent to your Gmail account.

How the Australian election has invaded your inbox with email tracking tools

How the Australian election has invaded your inbox with email tracking tools

The ABC found various pixels in campaign emails sent by the Australian Greens, the Labor and the Liberal Party, as well as from lobby groups Advance Australia and GetUp. Open tracking is a standard technique used by marketers, as well as by newsletter services deployed by media organisations, including the ABC, but its use in electioneering has privacy experts concerned.

The Best and Worst Companies for Defending Your Data Privacy

The Best and Worst Companies for Defending Your Data Privacy

Each year, the Electronic Frontier Foundation digital rights group releases a report outlining which major tech companies “have your back.” The study evaluates whether companies follow data privacy standards, tell users about government data requests, promise not to sell user data, resist National Security Letter gag orders and reject internet surveillance.

California Attorney General Must Investigate Improper Database Searches on Community Observers at Controversial Police Event

California Attorney General Must Investigate Improper Database Searches on Community Observers at Controversial Police Event

On April 12, Media Alliance and the Electronic Frontier Foundation filed a request for investigation into possible misuse of the CLETS database and a request that the agency cease all similar background checks on journalists and advocates engaged in oversight roles.

Mozilla criticizes Apple's iPhone privacy claims, launches online petition

Mozilla criticizes Apple's iPhone privacy claims, launches online petition

Mozilla is going so far as to launch a petition, hoping to get Apple to change an important iPhone default setting. Each iPhone that Apple sells comes with a unique ID (called an 'identifier for advertisers' or IDFA), which lets advertisers track the actions users take when they use apps.

EFF Submits Consumer Data Privacy Comment to the California Attorney General

EFF Submits Consumer Data Privacy Comment to the California Attorney General

The Electronic Frontier Foundation has filed comments on two issues: first, how to verify consumer requests to companies for access to personal information, and for deletion of that information; and second, how to make the process of opting out of the sale of data easy, using the framework already in place for the Do Not Track (DNT) system.

More