Your Smart TV is probably ignoring your PiHole

Your Smart TV is probably ignoring your PiHole

We’re going to create two Port Forward NAT rules - one to redirect any DNS queries originating from devices on the LAN to PiHole, and another to allow PiHole to commmunicate with external DNS servers.

How To: Privacy-centric DNS

How To: Privacy-centric DNS

After that is out of the way (please don’t reboot now because you won’t have the necessary other bits configured, please be patient), edit your local /etc/dnscrypt-proxy/ configuration file to set up the upstream server you want to use.

Hackers hijack and publish mental health data of hundreds of people

Hackers hijack and publish mental health data of hundreds of people

In a country that claims to be at the forefront of digitization and data security, the criminals managed to access the database of thousands of customers of the company Vastaamo after detecting vulnerabilities in their system.

Google gives IP addresses to police of people who have searched particular keywords or addresses

Google gives IP addresses to police of people who have searched particular keywords or addresses

According to court records from an arson case in Florida, Google regularly provides information to law enforcement about people that search a particular term or physical location using a Google service like Google Search or Google Maps.

Google is giving data to police based on search keywords, court docs show

Google is giving data to police based on search keywords, court docs show

But a recently unsealed court document found that investigators can request such data in reverse order by asking Google to disclose everyone who searched a keyword rather than for information on a known suspect.

Sonos is spying on me… (and you)

Sonos is spying on me… (and you)

Functional Data: This data is absolutely necessary for your Sonos Product or Service, including Sonos Radio, to perform its basic functions in a secure way and you will not be able to opt out from this data collection, sharing, and/or processing if you want to continue to use your Sonos Products.

Ente

Ente

Memories are precious.To start with, ente is a privacy friendly alternative to Google Photos that supports end-to-end encryption.That if there were good alternatives with strict privacy policies, some of us would switch.

Private data gone public: Razer leaks 100,000+ gamers’ personal info

Private data gone public: Razer leaks 100,000+ gamers’ personal info

Razer offered the following public statement concerning the leak: We were made aware by Mr. Volodymyr of a server misconfiguration that potentially exposed order details, customer and shipping information.

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Updated: January 5, 2019 — Additional testing was performed against Skype that revealed that URL previews were still working.Slack was happy to generate URL previews and identified itself with the following User-Agent:.

Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

Visiting a clearnet website that logs your IP address when trying to torrent privately is bad enough, knowing that your logs will actually be given up to copyright infringement lawyers and end up being used against you in legal proceedings is a real life and ongoing worst case scenario for torrenters around the world.

How to purchase bitcoin 100% anonymously without ID

How to purchase bitcoin 100% anonymously without ID

Save the answer to the security question in the text file with the login and password.Then click “Approve Login!” .Now when you go back to the tab which asked you to check your email, you should see the following screen.

We found 350 million email adresses on an unsecured server

We found 350 million email adresses on an unsecured server

Here are some examples of how potential attackers can use the data found in the unsecured Amazon S3 bucket against the owners of the exposed email addresses:Spamming 350 million email IDsCarrying out phishing attacksBrute-forcing the passwords of the email accountsAttackers can also combine the leaked email addresses with data from other breaches and build more detailed pictures of their potential targets.

Privacy and Voting

Privacy and Voting

Literally anyone anywhere with no record or oversight can go to your state or county election website, type in a few details about you (usually last name and date of birth are sufficient) and pull up your full name, date of birth, home address, phone number, email, sex, and more.

GitHub - Chatcola-com/chatcola: chatcola.com messaging server - self-host your messages without multi-domain hell!

GitHub - Chatcola-com/chatcola: chatcola.com messaging server - self-host your messages without multi-domain hell!

3) Obtain a domain and a certificate (look steps 2 and 3 below in "Steps - WITHOUT SUDO ACCESS") and copy them to a directory of your choice - for example into /opt/chatcola.

How BeerAdvocate Learned They'd Been Pwned

How BeerAdvocate Learned They'd Been Pwned

You'll never believe what happened next...The tl;dr is that someone with a BeerAdvocate account was convinced the service had been pwned as they'd seen evidence of an email address and password they'd used on the service being abused.

Pop Smoke's social media led killers to LA home after he posted his address online by mistake

Pop Smoke's social media led killers to LA home after he posted his address online by mistake

Jonathan Tippet of Los Angeles Police Department's elite Robbery-Homicide Division, said that three men and two teenage boys likely went to the home because they knew Pop Smoke was there from social media posts.

FreePN - 4 Tips to Stay Private While Job Hunting

FreePN - 4 Tips to Stay Private While Job Hunting

Sharing information such as your mailing address and phone number on a publicly available online resume is a bad idea; scammers sometimes use public resumes to look for identifying information and use that to employ phishing scams, blackmail, or identity theft.

Tracking user location from IP address using Google API

Tracking user location from IP address using Google API

Tracking user location from IP address using Google API.ISP Geolocation LocationNotice the identified latitude and longitude, marking it on google map (below)you can see the distance of this location from my original point of access.

How To Hide Your Real Email Address

How To Hide Your Real Email Address

In this article, I’m going to share a neat little trick (or rather a service that I’m personally using) with which you can hide your real email address and still continue using your email service to send/receive emails as usual.

How often does your IP address change without a VPN?

How often does your IP address change without a VPN?

Specifically, the study looks at IP address retention periods of internet service providers (ISPs) around the world.Of the ten countries, the study found that ISPs in the Netherlands showed the highest average IP address retention period at a whopping 36.96 days between IP address changes.

Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

Zoom is Leaking Peoples' Email Addresses and Photos to Strangers

The issue lies in Zoom's "Company Directory" setting, which automatically adds other people to a user's lists of contacts if they signed up with an email address that shares the same domain.

Announcing the Results of the 1.1.1.1 Public DNS Resolver Privacy Examination

Announcing the Results of the 1.1.1.1 Public DNS Resolver Privacy Examination

Except for randomly sampled network packets captured from at most 0.05% of all traffic sent to Cloudflare’s network infrastructure, Cloudflare will not retain the source IP from DNS queries to the public resolver in non-volatile storage (more on that below).

Mozilla does not respect user requests to stop tracking telemetry data

Mozilla does not respect user requests to stop tracking telemetry data

As an explanation, Mozilla claims that “we need better insight into our opt-out rates for telemetry” to “ensure new features improve your user experience and to guide Mozilla’s business decisions.”.

Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. users

Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. users

However, the way Mozilla implemented DNS-over-HTTPS in the Firefox web browser also received criticism over in past few months over favoring Cloudflare and instead of trying to upgrade to an encrypted DoH server operated by the user's existing DNS provider.

Firefox turns controversial new encryption on by default in the US

Firefox turns controversial new encryption on by default in the US

Starting today, Mozilla will turn on by default DNS over HTTPS (DoH) for Firefox users in the US, the company has announced.When it announced that it would be turning on DoH by default last year, Mozilla said that it would allow for opt-in parental controls and disable DoH if Firefox detects them.

Facebook Is More Concerned With the Appearance of Privacy, According to Mark Zuckerberg

Facebook Is More Concerned With the Appearance of Privacy, According to Mark Zuckerberg

One of the more interesting insights that comes from Mark Zuckerberg's lost journal pages, as reported by Wired's Steven Levy, is that even early on, the Facebook founder clearly wanted people to feel like they are having a private experience.

Say Goodbye to most Desktop and Mobile Adwares

Say Goodbye to most Desktop and Mobile Adwares

Thus, once you connected your device to the latter—note that you have to do this process on each WiFi network which you want to change the DNS values of — , just go in the WiFI settings and long press on “MyPrettyWiFi”.

Grindr, Tinder privacy: How to keep dating apps from selling your data

Grindr, Tinder privacy: How to keep dating apps from selling your data

Whether it's hackers or predators, a cybercriminal can use that information to send you a phishing email, and you can fall for it," said Jo O'Reilly, a data privacy expert at ProPrivacy.Report: Dating apps like Grindr, Tinder and OkCupid collect, share your personal data.

Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

If you have no patch available yet or your device is not supported anymore, you can try to mitigate the impact by some generic behavior rules: Only enable Bluetooth if strictly necessary.

What Your Period Tracker App Knows About You

What Your Period Tracker App Knows About You

While the Facebook suit isn’t related to personal health data, it’s not hard to imagine that the information collected by period trackers—especially with some employers and health insurers licensing the apps to use as part of corporate wellness programs—could be used in ways that harm women, King says.