Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Whether you are living and working in a high-threat environment or period of civil unrest, worry about being vulnerable to hacking of your financial data or online profiles, or are simply an advocate for personal privacy and liberty, it’s important to understand the methods by which you are tracked, and by whom, and for what purpose.

Each Chrome extension has to reveal which data it collects and how it processes it from 2021 onward

Each Chrome extension has to reveal which data it collects and how it processes it from 2021 onward

Starting January 2021, each extension’s detail page in the Chrome Web Store will show developer-provided information about the data collected by the extension, in clear and easy to understand language.

The 200 Most Common Online Passwords of 2020 Are Awful

The 200 Most Common Online Passwords of 2020 Are Awful

Understandably, it’s difficult to keep track of passwords, especially this year with the rise of online work.According to the survey done by NordPass, nowadays, the average user has around 100 passwords,” Cerniauskaite said.

Who am I to decide when algorithms should make important decisions?

Who am I to decide when algorithms should make important decisions?

Technical know-how, whether in government or in the technology industry, cannot substitute for contextual understanding and lived experiences in determining whether it’s appropriate to apply AI systems in sensitive social domains.

Amazon refuses to appear before Indian parliamentary panel on data privacy - MP

Amazon refuses to appear before Indian parliamentary panel on data privacy - MP

NEW DELHI (Reuters) - Representatives of Inc in India have refused to appear before a parliamentary panel reviewing the country’s privacy bill, an Indian lawmaker said on Friday, an allegation the U.S. commerce giant said was a result of a misunderstanding.

CDO Question to Ask About Data Protection

CDO Question to Ask About Data Protection

Unless you know what data your organization holds, you can’t track and protect it.Mapping how data is transferred from one system to another helps you understand how personal data moves inside your organization and identify critical privacy compliance issues such as cross-border transfers.

Notes on “I've got nothing to hide” and Other Misunderstandings of Privacy

Notes on “I've got nothing to hide” and Other Misunderstandings of Privacy

Decent is an ad-free, privacy-first Twitter reading experience Join 22 others in the waiting list!.The problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems (the disclosure of personal information or surveillance) and not others.

Three Interactive Tools for Understanding Police Surveillance

Three Interactive Tools for Understanding Police Surveillance

The Electronic Frontier Foundation has three interactive tools that help you learn about the new technologies being deployed around the United States and how they impact you: the Atlas of Surveillance, Spot the Surveillance, and Who Has Your Face?.

App privacy details on the App Store

App privacy details on the App Store

You’ll need to identify whether each data type is linked to a user’s account, device, or identity by you and/or your third-party partners.You’ll need to understand whether you and/or your third-party partners use data from your app to track users and, if so, which data is used for this purpose.

Digital Services Act: what we learned about tackling the power of digital platforms

Digital Services Act: what we learned about tackling the power of digital platforms

From February 2019, EDRi met with academics, civil society organisations and representatives of the European Commission and the Parliament to better understand what type of reform was envisaged for the e-Commerce Directive.

ThreatSpike Blog: Zoom still don't understand GDPR

ThreatSpike Blog: Zoom still don't understand GDPR

During the last month, Threatspike EDR detected the widely used Zoom Windows client accessing the Google Chrome cookie file during the uninstall process.The file is seen accessing the user's Chrome Cookies file and reading parts of the file that do not contain Zoom related information.

Verily, Google’s health-focused sister company, is getting into insurance

Verily, Google’s health-focused sister company, is getting into insurance

Once they hit the predetermined point of money they pay for their employees’ health, the stop-loss insurance company pays the rest.For example, Coefficient claims its “analytics-based underwriting engine” will help employers better understand risk that they’re taking on.

The Big Tech Extortion Racket

The Big Tech Extortion Racket

To understand this power and its implications, consider Uber, whose service was designed to manipulate both buyer and seller using personalized price discrimination, as the company has admitted.

Hackers hit university online exam tool

Hackers hit university online exam tool

A data security breach involving an online examination tool used by Australian universities is under investigation."Any breach of security and privacy of this type is of course deeply concerning and we will continue to work with ProctorU to understand the circumstances of the breach and determine whether any follow-up actions are required on our part," the spokeswoman said.

Uber drivers are suing for their data and it has big implications for the $200 billion gig economy

Uber drivers are suing for their data and it has big implications for the $200 billion gig economy

Understanding the data and how it is used by the algorithms is the first step in addressing the asymmetric power between gig economy workers and tech giants like Uber, according to Farrar.

Facebook Adds $100M to Privacy Settlement in Bid to Satisfy Skeptical Judge

Facebook Adds $100M to Privacy Settlement in Bid to Satisfy Skeptical Judge

With this alternative perspective — namely, Facebook could be looking at a damages award three to five times the settlement figure and possibly more ("I'd also like to understand why there was no discussion whatsoever on why this is not a case where the enhanced damages of $5,000 per person are on the table," said the judge at the June 4 hearing) — the parties went back into mediation and came to a revised agreement.

The Lawful Access to Encrypted Data Act shows that politicians still don’t understand encryption

The Lawful Access to Encrypted Data Act shows that politicians still don’t understand encryption

The government has a long , long history of trying to ban encryption and force tech companies to include encryption backdoors that can be opened by the government; however, they willfully miss the point that such requests are mutually exclusive to their wishes.

Has the battle for privacy already been lost?

Has the battle for privacy already been lost?

“With over a third of consumers across 10 countries (roughly 350 million people) experiencing cybercrime in the last year alone, consumers are understandably concerned about their privacy and attempting to take action to protect it,” the report says.

Scraping Court Records Data to Find Dirty Cops

Scraping Court Records Data to Find Dirty Cops

Below, we’ve provided a detailed breakdown of what this potential reality could look like when applied to one South Florida county’s public databases, along with information on how citizens and communities can use public data to better understand the behaviors of local law enforcement and even individual police officers.

Hungary suspends some GDPR privacy protections as part of COVID-19 “state of emergency”

Hungary suspends some GDPR privacy protections as part of COVID-19 “state of emergency”

The ruling party doesn’t seem to understand why the entire world is upset by the overreach of power and the fact that the state of emergency doesn’t have a set date to end.

Understanding the Benefits and Downsides of Proxies

Understanding the Benefits and Downsides of Proxies

Proxies can be used to filter unwanted pages and prevent potentially accessing them by someone unaware that the website poses a threat.Proxy servers do not offer as much as a well-optimized internet browser or a great ISP provider, but they can still improve the overall browsing experience.

Amazon: How Bezos built his data machine

Amazon: How Bezos built his data machine

Once a week they too delved into individuals' behaviour.“We had to make it actionable,” Selinger continues.“So to do that, we would project on the wall this view [of a] single customer and try to understand who she was.Weigend and Selinger moved on, but Amazon continued to hire talent to find innovative ways to turn data into dollars.

How Surveillance Capitalism Targets the Vulnerable

How Surveillance Capitalism Targets the Vulnerable

While the elderly might have showed up late to the internet and smartphones, there’s no reason to be believe they will be immune to the consequences that young people in particular are now beginning to understand.

Edison Mail Responds to Report on Email Apps Selling Anonymized Data Scraped From Inboxes

Edison Mail Responds to Report on Email Apps Selling Anonymized Data Scraped From Inboxes

Edison Mail is transparent about its data collection in its privacy policy, for example, noting that it uses "non-personal data such as seller, product and price extracted from information we collect" to help its Edison Trends business partners "aggregate and understand commerce trends.".

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Prompted by the post, many users noticed that the storage scanner in the Device Care section included a little note: “powered by 360.” Even in China, Qihoo 360 is well known for its past privacy transgressions and controversies and it’s understandable why Samsung users would be incredibly concerned that anything at all from Qihoo is preinstalled on their phone.

'Do Not Sell My Info': U.S. retailers rush to comply with California privacy law

'Do Not Sell My Info': U.S. retailers rush to comply with California privacy law

WASHINGTON (Reuters) - U.S. retailers including Walmart Inc will add “Do Not Sell My Info” links to their websites and signage in stores starting Jan. 1, allowing California shoppers to understand for the first time what personal and other data the retailers collect, sources said.

DNA test kits threaten kids’ privacy in ways we can’t understand yet

DNA test kits threaten kids’ privacy in ways we can’t understand yet

Privacy policy design can be an ambiguous business even with the best intentions, and I think it would be naive of a consumer to believe that DNA testing companies don’t have an incentive to leverage your data in ways that can’t be foreseen.

Inside Amazon’s plan for Alexa to run your entire life

Inside Amazon’s plan for Alexa to run your entire life

From a software perspective, these abilities will require Alexa to use new methods for processing and understanding all the disparate sources of information.This level of prediction and reasoning will also need to account for video data as more and more Alexa-compatible products include cameras.

'I've Got Nothing to Hide' and Other Misunderstandings of Privacy

'I've Got Nothing to Hide' and Other Misunderstandings of Privacy

In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument.In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.

HuffPost is now a part of Verizon Media

HuffPost is now a part of Verizon Media

We (Verizon Media) and our partners need your consent to access your device, set cookies, and use your data, including your location, to understand your interests, provide relevant ads and measure their effectiveness.Verizon Media will also provide relevant ads to you on our partners' products.

More