Privacy News Online | Weekly Review: November 27, 2020

Privacy News Online | Weekly Review: November 27, 2020

New details about the official app used by the Trump 2020 campaign have been revealed and things aren’t looking good.Privacy News Online is brought to you by Private Internet Access, the world’s most trusted VPN service.

Google sued for using 260mb of cellular data per month to track Android users without permission

Google sued for using 260mb of cellular data per month to track Android users without permission

One other thing that the lawsuit brings up is that Google sends preloaded tokens that represent ads to Android mobile users, but these ads sometimes aren’t even loaded even though Google counts the impression.

Financially troubled startup helped power Trump campaign

Financially troubled startup helped power Trump campaign

But after Uber filed suit against Phunware, alleging the software company committed fraud by among other things, allowing ads for the ride-sharing app to show up on porn sites, former employees said the startup looked for new ways to diversify its revenue stream.

New Google app could help providers block phone functions if you miss installment payments

New Google app could help providers block phone functions if you miss installment payments

The app’s function is described on the Play Store as follows: Device Lock Controller enables device management for credit providers.Sometimes devices from carriers with outstanding balances could be blacklisted from working on the network until the balance of the phone is paid off – the same thing can happen when a customer decides to leave the carrier.

Threema Multi-Device: An Architectural Overview

Threema Multi-Device: An Architectural Overview

If, however, the multi-device protocol is required to meet Threema standards, things get complicated.In order to fulfill Threema’s requirements, a multi-device solution must, of course, provide full end-to-end encryption.

Everything You Need To Know About Browser Cookies

Everything You Need To Know About Browser Cookies

When you go back to a website over and over your browser will remember the preferences you like through cookies.A session cookie is used to remember what you have in your cart as you browse an online store.

FBI warns ransomware assault threatens US healthcare system

FBI warns ransomware assault threatens US healthcare system

The aggressive offensive by a Russian-speaking criminal gang coincides with the U.S. presidential election, though there was no immediate indication it was motivated by anything but profit.“We are experiencing the most significant cyber security threat we’ve ever seen in the United States,” Charles Carmakal, chief technical officer of the cybersecurity firm Mandiant, said in a statement.

Why Getting Paid for Your Data Is a Bad Deal

Why Getting Paid for Your Data Is a Bad Deal

Supporters of data dividends correctly recognize one thing: when it comes to privacy in the United States, the companies that collect information currently hold far more power than the individual consumers continually tapped for that information.

How I’ve Convinced People Around Me to Care About Privacy

How I’ve Convinced People Around Me to Care About Privacy

That’s an argument for another day that I’m currently working on, but the point is that while I made these opinions known to my brother I was always quick to follow it up with “I love you, you do what you want, these are just my views.” Same thing with my partner.

This AI automagically creates fake faces for privacy-safe photo sharing

This AI automagically creates fake faces for privacy-safe photo sharing

John Koetsier: So, a couple questions that come up — and we’re going to get into the questions around I want to share pictures of myself, maybe my family, or something like that, and I want to do that in a privacy safe way.

When you tell Chrome to wipe private data about you, it spares two websites from the purge: Google.com, YouTube

When you tell Chrome to wipe private data about you, it spares two websites from the purge: Google.com, YouTube

While cookies are typically used to identify you and store some of your online preferences when visiting websites, site data is on another level: it includes, among other things, a storage database in which a site can store personal information about you, on your computer, that can be accessed again by the site the next time you visit.

Why privacy matters - Glenn Greenwald

Why privacy matters - Glenn Greenwald

The "Nothing to hide" argument follows the idea that there are two kinds of people: good and bad.The only people who care about privacy are by definition "bad people".An implicit bargain: if you're untreatening and harmless to those who have political power, then and only then can you be free of the dangers of surveillance.

Microsoft will adopt Google Chrome's controversial Manifest V3 in Edge

Microsoft will adopt Google Chrome's controversial Manifest V3 in Edge

The Web Request API will still be available and still be able to provide information about all network requests fired by the browser … as opposed to what those announcements state, the deprecation of the blocking ability of the webRequest API accomplishes nothing privacy-wise for content blockers since they will *still* require broad hosts permissions.".

Dear Google: We Agree Search Competition Should Be "Only 1 Click Away" – So Why Is It 15+ on Android?

Dear Google: We Agree Search Competition Should Be "Only 1 Click Away" – So Why Is It 15+ on Android?

Dear Google, one of the most repeated lines you’ve used to fend off antitrust inquiries is to say search competition is “only one click away.” The recent House Antitrust Subcommittee report notes that “in an internal presentation about [Microsoft] Internet Explorer’s default search selection, Google recommended that users be given an initial opportunity to select a search engine and that browsers minimize the steps required to change the default search provider.” Finally, something we can agree on!

You Have Nothing to Hide? We bet you do.

You Have Nothing to Hide? We bet you do.

Today, the surveillance cameras of public authorities and the data centers of advertising companies are the big bogeyman, because they create profiles of all people who move around the Internet.

Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything

Five Eyes nations plus Japan and India call for Big Tech to bake backdoors into everything

The nations of the Five Eyes security alliance – Australia, Canada, New Zealand, the USA and the UK – plus Japan and India, have called on technology companies to design their products so they offer access to encrypted messages and content.

Notes on “I've got nothing to hide” and Other Misunderstandings of Privacy

Notes on “I've got nothing to hide” and Other Misunderstandings of Privacy

Decent is an ad-free, privacy-first Twitter reading experience Join 22 others in the waiting list!.The problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems (the disclosure of personal information or surveillance) and not others.

Tor In 2020, What Changed?

Tor In 2020, What Changed?

The press is still one of the most threatening things for Tor. It's often portrayed to only be used by criminals and the like, even though most people use it for regular browsing in the hope of not being tracked.

Why privacy must be at the core of every tech product

Why privacy must be at the core of every tech product

The EU has been more willing to take on this fight with big companies and it’s a really good thing because we need the competition, but we also need to have regulations on the data that is collected on people.

The "Hackable" Human may become more "Hackable" and hence more vulnerable.

The "Hackable" Human may become more "Hackable" and hence more vulnerable.

In this case, its technology claimed to interpret “Aggression”.This is called Affective Computing[7].And no, and I do not mean the surveillance aspect of things.

Facebook leaks show Mark Zuckerberg defending his decisions to angry employees

Facebook leaks show Mark Zuckerberg defending his decisions to angry employees

“I’m not sure if I’m missing something from this question,” Zuckerberg responded, in polite disbelief, “but I certainly haven’t seen any data that suggests that free food is anywhere near the list of primary reasons that people come to work at this company.

When the GDPR goes wrong…

When the GDPR goes wrong…

The merit behind the Bradford Trigger has nothing to do with personal data; each variable of the formula is a piece of information, which a company shall record, inter alia as required under the labour laws.

Starting Sunday, TikTok and WeChat banned in US: American users will need a VPN

Starting Sunday, TikTok and WeChat banned in US: American users will need a VPN

The news comes from a U.S. Department of Commerce press release which is titled: “Commerce Department Prohibits WeChat and TikTok Transactions to Protect the National Security of the United States.” Where many people use VPNs in China to bypass Chinese censorship of American apps and services, the reverse is now going to become a thing.

Five iOS 14 and iPadOS 14 security and privacy features you need to know about

Five iOS 14 and iPadOS 14 security and privacy features you need to know about

Also, if you access Control Center, there's a notice at the top showing you recent apps that have accessed the camera or microphone.Apps requesting local network access.Another thing that you'll see after installing iOS 14/iPadOS 14 is apps requesting local network access.

Because Too Many People Still Don't Know Why The EARN IT Bill Is Terrible, Here's A Video

Because Too Many People Still Don't Know Why The EARN IT Bill Is Terrible, Here's A Video

The second part is an articulation of all the reasons the EARN IT bill in particular is terrible and the specific damage it would do to encryption and civil liberties, along with ruining Section 230 and everything important that it advances.

A fired Facebook employee wrote a scathing 6,600-word memo detailing the company's failures to stop political manipulation around the world

A fired Facebook employee wrote a scathing 6,600-word memo detailing the company's failures to stop political manipulation around the world

A recently fired Facebook employee wrote a memo on her last day at the company detailing how the tech giant routinely ignored or did not prioritize fake accounts' efforts to manipulate elections and political climates around the world, according to a Monday Buzzfeed report.

If the Government Had Its Way, Everything Could be Wiretapped

If the Government Had Its Way, Everything Could be Wiretapped

The battle over encryption and secure communications suggests that governments think the answer is “everything,” at least so long as investigators aren’t violating weak privacy laws.People want to have private conversations that are not recorded for all time, and these platforms are making that possible again.

Kindle Collects a Surprisingly Large Amount of Data

Kindle Collects a Surprisingly Large Amount of Data

Every page that is read sends the following information:Time a page was opened (when you turn to a new page, a timestamp is generated)The first character on the page (This might be something like character 7705 in the book, which is the exact location)The last character on the pageIf the page is images or textHere's a sample record that is sent with every page read:.

US government built secret iPod with Apple’s help, former engineer says

US government built secret iPod with Apple’s help, former engineer says

An Apple engineer who helped launch the iPod said he helped the US government build a secret version of the device that could covertly collect data.Among other things, Shayer helped the men find their way around the Windows-based developer tools Apple used at the time to build software for ARM chips.

Person of Interest

Person of Interest

Finch discovered that the machine sees everything, potential terrorist acts and violent crimes that involve ordinary people.Partnered with John Reese, an ex-CIA agent, the two work in secret to prevent violent crimes before they can happen.

More